A reversible image watermarking algorithm for tamper detection based on SIFT

被引:4
作者
Zhang, Zhengwei [1 ]
Xiao, Weien [1 ]
Liu, Tianfu [1 ]
Li, Yao [1 ]
Jin, Shenghua [1 ]
Li, Fenfen [1 ]
Wang, Hongya [1 ]
机构
[1] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian 223003, Jiangsu, Peoples R China
关键词
Tamper localization; Reversible image watermarking; SIFT (Scale-invariant feature transform); Invariant distance; Authentication watermark; RECOVERY; AUTHENTICATION; SCHEME; SYSTEM;
D O I
10.1007/s11042-023-16976-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The integrity of the digital image content is very important for special types of images. To better locate tampered regions in the image, this paper proposes a reversible watermarking technology for tamper localization based on SIFT. By dividing the original image into blocks, the feature information of each sub-block is computed as the authentication watermark. The carrier image is then processed to extract the feature region of the image, and the authentication watermark generated by each sub-block is embedded into the corresponding feature region through mapping. When the watermarked image is attacked, the related attack is detected by the invariant moment, and the sub-block feature value and the authentication watermark extracted from the feature region are calculated to determine if the sub-block has been tampered with, and if so, the position of the tampered region is given. The experimental result illustrates this scheme can detect and locate the tamper region effectively and accurately, and the scheme has certain robustness and invisibility.
引用
收藏
页码:34647 / 34668
页数:22
相关论文
共 31 条
  • [1] SVD based fragile watermarking scheme for tamper localization and self-recovery
    Ansari, Irshad Ahmad
    Pant, Millie
    Ahn, Chang Wook
    [J]. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) : 1225 - 1239
  • [2] Tamper detection and restoring system for medical images using wavelet-based reversible data embedding
    Chiang, Kuo-Hwa
    Chang-Chien, Kuang-Che
    Chang, Ruey-Feng
    Yen, Hsuan-Yen
    [J]. JOURNAL OF DIGITAL IMAGING, 2008, 21 (01) : 77 - 90
  • [3] An effective SVD-based image tampering detection and self-recovery using active watermarking
    Dadkhah, Sajjad
    Abd Manaf, Azizah
    Hori, Yoshiaki
    Hassanien, Aboul Ella
    Sadeghi, Somayeh
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (10) : 1197 - 1210
  • [4] Robust zero-watermarking algorithm for medical images based on SIFT and Bandelet-DCT
    Fang, Yangxiu
    Liu, Jing
    Li, Jingbing
    Cheng, Jieren
    Hu, Jiabin
    Yi, Dan
    Xiao, Xiliang
    Bhatti, Uzair Aslam
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (12) : 16863 - 16879
  • [5] Exposing Digital Forgeries From JPEG Ghosts
    Farid, Hany
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (01) : 154 - 160
  • [6] Blind Reversible Authentication Based on PEE and CS Reconstruction
    Gao, Guangyong
    Cui, Zongmin
    Zhou, Caixue
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2018, 25 (07) : 1099 - 1103
  • [7] A secure image authentication scheme based on dual fragile watermark
    Gong, Xinhui
    Chen, Lei
    Yu, Feng
    Zhao, Xiaohong
    Wang, Shihong
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (25-26) : 18071 - 18088
  • [8] A novel hash function based fragile watermarking method for image integrity
    Gul, Ertugrul
    Ozturk, Serkan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) : 17701 - 17718
  • [9] An efficient watermarking technique for tamper detection and localization of medical images
    Gull, Solihah
    Loan, Nazir A.
    Parah, Shabir A.
    Sheikh, Javaid A.
    Bhat, G. M.
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (05) : 1799 - 1808
  • [10] An efficient reversible image authentication method using improved PVO and LSB substitution techniques
    Hong, Wien
    Chen, Meijin
    Chen, Tung Shou
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 58 : 111 - 122