A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion

被引:12
作者
Ouyang, Junlin [1 ,2 ,3 ]
Huang, Jingtao [1 ,2 ]
Wen, Xingzi [2 ]
Shao, Zhuhong [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Hunan Key Lab Serv Comp & Novel Software Technol, Xiangtan 411201, Peoples R China
[3] Hunan Software Vocat & Tech Univ, Xiangtan 411100, Peoples R China
[4] Capital Normal Univ, Coll Informat Engn, Beijing 100048, Peoples R China
关键词
Semi-fragile watermarking; Quaternion discrete Fourier transform; Tamper localization; Iimage forensics; IMAGE AUTHENTICATION; ALGORITHM; SCHEME; DIFFERENCE; RANKING; WAVELET;
D O I
10.1007/s11042-022-13938-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Accurate tamper localization is one of the most challenging problems in semi-fragile watermarking authentication schemes. The existing semi-fragile watermarking methods have some problems, such as blurred localization shape and high false alarm rate, which stem from the rough analysis of tampering information. To address these problems, this paper proposes a semi-fragile watermarking tamper localization method based on quaternion discrete Fourier transform (QDFT) and multi-view fusion, which embeds two watermarks in the QDFT domain for robust resistance to the geometric attack and integrity protection of host image, respectively. On the receiver side, considering that the difference map in binary mode is difficult to identify tampering, the global information and local smoothing cues are used in the method, to obtain the multi-scale candidate maps with real values instead of binary. Then, local adaptive fusion is accomplished by minimizing the energy function, to obtain a more consistent single tampering map. The design of the energy function integrates the image content and multi-scale feature views. Finally, a tamper seed-based propagation strategy is designed to generate a binary map of the tampered regions. Experimental results show that the proposed method provides better resistant to signal processing attacks, and the F-measure value of tamper localization is improved by 11.17% on average compared to the state-of-the-art methods.
引用
收藏
页码:15113 / 15141
页数:29
相关论文
共 62 条
[1]   ReDMark: Framework for residual diffusion watermarking based on deep networks [J].
Ahmadi, Mahdi ;
Norouzi, Alireza ;
Karimi, Nader ;
Samavi, Shadrokh ;
Emami, Ali .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 146
[2]   Content-adaptive semi-fragile watermarking for image authentication [J].
Al-Mualla, Mohammed E. .
2007 14TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-4, 2007, :1256-1259
[3]   Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique [J].
Al-Otum, Hazem Munawer .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1064-1081
[4]  
[Anonymous], 1997, USC SIPI
[5]  
[Anonymous], 2017, CASIA
[6]   An intelligent reversible watermarking system for authenticating medical images using Wavelet and PSO [J].
Balasamy, K. ;
Ramakrishnan, S. .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02) :S4431-S4442
[7]   Hybrid LSTM and Encoder-Decoder Architecture for Detection of Image Forgeries [J].
Bappy, Jawadul H. ;
Simons, Cody ;
Nataraj, Lakshmanan ;
Manjunath, B. S. ;
Roy-Chowdhury, Amit K. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2019, 28 (07) :3286-3300
[8]   Tamper detection and self-recovery scheme by DWT watermarking [J].
Benrhouma, Oussama ;
Hermassi, Houcemeddine ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2015, 79 (03) :1817-1833
[9]   New watermarking algorithm utilizing quaternion Fourier transform with advanced scrambling and secure encryption [J].
Bhatti, Uzair Aslam ;
Yuan, Linwang ;
Yu, Zhaoyuan ;
Li, JingBing ;
Nawaz, Saqib Ali ;
Mehmood, Anum ;
Zhang, Kun .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (09) :13367-13387
[10]   An adaptive compressed MPEG-2 video watermarking scheme [J].
Biswas, S ;
Das, SR ;
Petriu, EM .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2005, 54 (05) :1853-1861