Image authentication using Zernike moment watermarking

The rapid development of internet and digital image editing softwares facilitated the access and illegal usage of digital images. Digital watermarking emerged as a unique tool to protect the authenticity of the image. It is a technique of insertion of a message into a cover media imperceptibly. In t...

Full description

Saved in:
Bibliographic Details
Main Author: Shojanazeri, Hamid
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://psasir.upm.edu.my/id/eprint/58138/1/FK%202013%2079IR.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-upm-ir.58138
record_format uketd_dc
spelling my-upm-ir.581382017-12-27T08:37:12Z Image authentication using Zernike moment watermarking 2013-07 Shojanazeri, Hamid The rapid development of internet and digital image editing softwares facilitated the access and illegal usage of digital images. Digital watermarking emerged as a unique tool to protect the authenticity of the image. It is a technique of insertion of a message into a cover media imperceptibly. In this thesis, the main objective is to design and develop a watermarking system for image authentication. A semi-fragile watermarking system using content-based techniques is proposed in this work to solve the problems with the previously proposed methods which are not robust against normal image processing operations such as rotation, scale, translation, noise addition and JPEG compression. The Zernike moments and Sobel edge map are used as watermarks to provide malicious attack classification and locating tampered area. The Zernike moments are chosen due to special characteristics such as robustness against rotation, scale, translation (RST) and noise. Also an image can be reconstructed from the extracted Zernike moments. These watermarks are generated from the approximation component of discrete wavelet decomposition in third level. The Sobel edge map is fused in wavelet coefficients of the corresponding component, and Zernike moments vector is fused in Sobel edge point of the original image. A comparison between recovered Zernike moments and generated Zernike moments form watermarked image at receiver determine the authenticity of the image. In case of authenticity failure, a comparison between recovered Sobel edge map and recently obtained Sobel edge map from the watermarked image detect the location of tampered areas. The results from the test show that the proposed algorithm has good performance in discriminating the malicious from non-malicious modifications which is the main character of an image authentication algorithm. This work significantly improves the robustness of semi-fragile characteristics of watermarking. It accepts scale, translation, noise pollution, rotation and JPEG compression modifications on the watermarked images,so it can solve the problem with previous methods with flaw of discrimination between malicious and non-malicious attacks. The adding or replacing a portion of the image is regarded as malicious attacks and rejected by this algorithm. Using two different watermarks lead to a good classification of incidental and malicious modifications and locating the tampered areas. Experimental results showed that this algorithm achieves better bit error rate against JPEG compression, rotation, scale and noise attacks in comparison with other reviewed schemes in this work. A great improvement is also achieved in the capacity of the watermarking system as shown in chapter Four. This scheme also offers better classification of malicious modifications over the other reviewed schemes in this work. Digital watermarking Watermarks Image processing - Digital techniques 2013-07 Thesis http://psasir.upm.edu.my/id/eprint/58138/ http://psasir.upm.edu.my/id/eprint/58138/1/FK%202013%2079IR.pdf application/pdf en public masters Universiti Putra Malaysia Digital watermarking Watermarks Image processing - Digital techniques
institution Universiti Putra Malaysia
collection PSAS Institutional Repository
language English
topic Digital watermarking
Watermarks
Image processing - Digital techniques
spellingShingle Digital watermarking
Watermarks
Image processing - Digital techniques
Shojanazeri, Hamid
Image authentication using Zernike moment watermarking
description The rapid development of internet and digital image editing softwares facilitated the access and illegal usage of digital images. Digital watermarking emerged as a unique tool to protect the authenticity of the image. It is a technique of insertion of a message into a cover media imperceptibly. In this thesis, the main objective is to design and develop a watermarking system for image authentication. A semi-fragile watermarking system using content-based techniques is proposed in this work to solve the problems with the previously proposed methods which are not robust against normal image processing operations such as rotation, scale, translation, noise addition and JPEG compression. The Zernike moments and Sobel edge map are used as watermarks to provide malicious attack classification and locating tampered area. The Zernike moments are chosen due to special characteristics such as robustness against rotation, scale, translation (RST) and noise. Also an image can be reconstructed from the extracted Zernike moments. These watermarks are generated from the approximation component of discrete wavelet decomposition in third level. The Sobel edge map is fused in wavelet coefficients of the corresponding component, and Zernike moments vector is fused in Sobel edge point of the original image. A comparison between recovered Zernike moments and generated Zernike moments form watermarked image at receiver determine the authenticity of the image. In case of authenticity failure, a comparison between recovered Sobel edge map and recently obtained Sobel edge map from the watermarked image detect the location of tampered areas. The results from the test show that the proposed algorithm has good performance in discriminating the malicious from non-malicious modifications which is the main character of an image authentication algorithm. This work significantly improves the robustness of semi-fragile characteristics of watermarking. It accepts scale, translation, noise pollution, rotation and JPEG compression modifications on the watermarked images,so it can solve the problem with previous methods with flaw of discrimination between malicious and non-malicious attacks. The adding or replacing a portion of the image is regarded as malicious attacks and rejected by this algorithm. Using two different watermarks lead to a good classification of incidental and malicious modifications and locating the tampered areas. Experimental results showed that this algorithm achieves better bit error rate against JPEG compression, rotation, scale and noise attacks in comparison with other reviewed schemes in this work. A great improvement is also achieved in the capacity of the watermarking system as shown in chapter Four. This scheme also offers better classification of malicious modifications over the other reviewed schemes in this work.
format Thesis
qualification_level Master's degree
author Shojanazeri, Hamid
author_facet Shojanazeri, Hamid
author_sort Shojanazeri, Hamid
title Image authentication using Zernike moment watermarking
title_short Image authentication using Zernike moment watermarking
title_full Image authentication using Zernike moment watermarking
title_fullStr Image authentication using Zernike moment watermarking
title_full_unstemmed Image authentication using Zernike moment watermarking
title_sort image authentication using zernike moment watermarking
granting_institution Universiti Putra Malaysia
publishDate 2013
url http://psasir.upm.edu.my/id/eprint/58138/1/FK%202013%2079IR.pdf
_version_ 1747812208404856832