You are on page 1of 12

A novel image tamper localization algorithm based on

watermarking technology

Published in : Optik
Published on :2013
Main Agenda
A self-embedding watermarking scheme
Watermark Generation Module
Block Mapping Module
Watermark Embedding Module
Watermark Extraction Module (Authentication)
Tamper localization
Results
Conclusion
Watermark Generation
Replace the two LSBs of the original image X with
0,that is X = X and (11111100)2 .
Divide the image X into N non-overlapping blocks
of size 2*2.
The 8-bit feature of image blockXi consists of the 6-
bit recovery data and 2-bit parity check bits .The 8-bit
feature for block Xi is denoted as: Fi = {fi1, fi2, fi3, fi4,
fi5, fi6, fi7, fi8} and will be used as watermark of
each block. Fi7= xor(fi1,fi2, fi3, fi4, fi5, fi6) and
fi8=inv(fi7)
This watermark will be embedded into another block
Block Mapping
This module decides that the watermark of a
particular block will be embedded in which block.
In this work, a chaotic sequence is used to generate
non-linear block mapping because the chaotic
system is sensitive to initial conditions and small
change of chaos parameters.
Watermark Embedding
In this module, the block to be embedded is modified by inserting
the 8 bit watermark according to the following equation.
x i j = 4xi j /4 + 2wij + wi(j+4) j = 1, 2, 3, 4
149 147
is the block where watermark is to be embedded.
148 150
Assume that the watermark for this specific block is
W(i,j) = [11001010]

According to the embedding equation, the pixel values of a single


152 149
block will change as given below.
149 150

After processing all the blocks in similar manner, the watermarked


image will be obtained.
Watermark Extraction
The 8 bits of the watermark are extracted from the
image Y (which can be a distorted one or an
unaltered one) based on the following equations.
Wij = mod(yij, 4), j = 1, 2, 3, 4
mod(yi(j4), 2), j = 5, 6, 7, 8

The 8 bit watermark embedded in LSBs is extracted.


Tamper Localization
After extracting the 8 bit watermark from each
block, the first 6 bits are XORed to calculate the
7th bit w*(i,7) of watermark. The 8th bit is inverse
of 7th bit.
If the extracted 7th bit of watermark equals the
embedded watermark and if w*(i,7) != w( i,8),
then the flag bit of a binary matrix is set to zero
means no tampering has occurred. Otherwise the
flag bit is set to 1.
The binary matrix Flag is used for localization.
Results
Tamper Detection Results(Content-only
tampering)
Performance Metrics
Tamper Detection Accuracy:
The accuracy of tampering detection varies with
tampering ratio. The tamper detection accuracy
results are calculated under different tamper ratios
(580%).
The tamper detection accuracy of this method is
improved by the three levels of tamper detection.
Even if the tamper ratio is up to 80%, the FDP and
FAP values are still low and this method can identify
the tamper blocks with a probability more than 98%.
Performance Metrics
PSNR: In the proposed scheme, the quality of
the watermarked images is high, with the
average of 42.6 dB.
Security: Relying on embedding water-mark of
each block in another block by a chaotic
sequence, the proposed scheme can achieve
higher security.
Conclusion
Higher security with better tamper detection
performance.

You might also like