A semi-fragile watermarking tamper localization method based on QDFT and multi-view fusion

被引:12
作者
Ouyang, Junlin [1 ,2 ,3 ]
Huang, Jingtao [1 ,2 ]
Wen, Xingzi [2 ]
Shao, Zhuhong [4 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Hunan Key Lab Serv Comp & Novel Software Technol, Xiangtan 411201, Peoples R China
[3] Hunan Software Vocat & Tech Univ, Xiangtan 411100, Peoples R China
[4] Capital Normal Univ, Coll Informat Engn, Beijing 100048, Peoples R China
关键词
Semi-fragile watermarking; Quaternion discrete Fourier transform; Tamper localization; Iimage forensics; IMAGE AUTHENTICATION; ALGORITHM; SCHEME; DIFFERENCE; RANKING; WAVELET;
D O I
10.1007/s11042-022-13938-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Accurate tamper localization is one of the most challenging problems in semi-fragile watermarking authentication schemes. The existing semi-fragile watermarking methods have some problems, such as blurred localization shape and high false alarm rate, which stem from the rough analysis of tampering information. To address these problems, this paper proposes a semi-fragile watermarking tamper localization method based on quaternion discrete Fourier transform (QDFT) and multi-view fusion, which embeds two watermarks in the QDFT domain for robust resistance to the geometric attack and integrity protection of host image, respectively. On the receiver side, considering that the difference map in binary mode is difficult to identify tampering, the global information and local smoothing cues are used in the method, to obtain the multi-scale candidate maps with real values instead of binary. Then, local adaptive fusion is accomplished by minimizing the energy function, to obtain a more consistent single tampering map. The design of the energy function integrates the image content and multi-scale feature views. Finally, a tamper seed-based propagation strategy is designed to generate a binary map of the tampered regions. Experimental results show that the proposed method provides better resistant to signal processing attacks, and the F-measure value of tamper localization is improved by 11.17% on average compared to the state-of-the-art methods.
引用
收藏
页码:15113 / 15141
页数:29
相关论文
共 62 条
[21]   WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II [J].
Haghighi, Behrouz Bolourian ;
Taherinia, Amir Hossein ;
Harati, Ahad ;
Rouhani, Modjtaba .
APPLIED SOFT COMPUTING, 2021, 101
[22]   An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network [J].
Haghighi, Behrouz Bolourian ;
Taherinia, Amir Hossein ;
Monsefi, Reza .
COGNITIVE COMPUTATION, 2020, 12 (04) :863-890
[23]   A semi-fragile image watermarking algorithm with two-stage detection [J].
Huo, Yaoran ;
He, Hongjie ;
Chen, Fan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (01) :123-149
[24]  
Jun Xiao, 2008, 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), P579, DOI 10.1109/CSSE.2008.331
[25]   Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-Polar Mapping [J].
Kang, Xiangui ;
Huang, Jiwu ;
Zeng, Wenjun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (01) :1-12
[26]   Multi-Scale Analysis Strategies in PRNU-Based Tampering Localization [J].
Korus, Pawel ;
Huang, Jiwu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) :809-824
[28]   F-DES: Fast and Deep Event Summarization [J].
Kumar, Krishan ;
Shrimankar, Deepti D. .
IEEE TRANSACTIONS ON MULTIMEDIA, 2018, 20 (02) :323-334
[29]   DWT based color image watermarking using maximum entropy [J].
Kumar, Sanjay ;
Singh, Binod Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (10) :15487-15510
[30]   Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication [J].
Li, Chunlei ;
Zhang, Aihua ;
Liu, Zhoufeng ;
Liao, Liang ;
Huang, Di .
MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (23) :10581-10604