A new fragile watermarking approach for tamper detection and recovery of document images

被引:0
作者
Chetan, K. R. [1 ]
Shivananda, Nirmala [2 ]
机构
[1] JNN Coll Engn, Dept CSE, Shimoga, India
[2] JNN Coll Engn, Dept ISE, Shimoga, India
来源
2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2014年
关键词
Fragile Watermarking; thresholding; Tamper detection; Tamper recovery;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a fragile watermarking scheme is proposed for tamper detection and recovery of digital images. In this scheme, the source document image is divided into blocks of uniform size and a pseudo-random mapping of blocks is generated. For each block, a watermark consisting of authentication and recovery information is generated and embedded into the corresponding mapping block. The authentication data is formed using the Least Significant Bit (LSB) of each pixel value in the block. The recovery information consists of sub-sampled versions of two moment-preserving thresholds of the block. At the receiver side, the watermark is extracted from the corresponding mapping blocks for each block of the watermarked document image. A dual-option parity check method is applied on the authentication data in the extracted watermark to check whether the watermarked image block is tampered or not. If the image block is found to be tampered, the recovery information is extracted from the watermark. From the experimental results it is found that the average value of tamper detection rate and recovery rate for various types of intentional attacks on the document images corpus is 93.8% and 93.6% respectively. Further, the average Peak Signal to Noise Ratio (PSNR) of the recovered images is 61.24%. The comparative analysis reveals that the proposed scheme outperforms the existing system [16].
引用
收藏
页码:1494 / 1498
页数:5
相关论文
共 16 条
  • [1] Hierarchical watermarking for secure image authentication with localization
    Celik, MU
    Sharma, G
    Saber, E
    Tekalp, AM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) : 585 - 595
  • [2] Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
    Chang, Chin-Chen
    Fan, Yi-Hsuan
    Tai, Wei-Liang
    [J]. PATTERN RECOGNITION, 2008, 41 (02) : 654 - 661
  • [3] Chen Tao, P INT C INF INF BEIJ, V5, P78
  • [4] Secure spread spectrum watermarking for multimedia
    Cox, IJ
    Kilian, J
    Leighton, FT
    Shamoon, T
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) : 1673 - 1687
  • [5] THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE
    FRIEDMAN, GL
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) : 905 - 910
  • [6] Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme
    He, Hongjie
    Chen, Fan
    Tai, Heng-Ming
    Kalker, Ton
    Zhang, Jiashu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 185 - 196
  • [7] Iwata M., 2010, 2010 International Symposium On Information Theory & Its Applications (ISITA 2010), P309, DOI 10.1109/ISITA.2010.5649171
  • [8] Jin XM, 2009, PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, P1, DOI 10.1109/ITNG.2009.10
  • [9] A watermarking sequence using parities of error control coding for image authentication and correction
    Lee, JJ
    Won, CS
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (02) : 313 - 317
  • [10] Dual watermark for image tamper detection and recovery
    Lee, Tien-You
    Lin, Shinfeng D.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3497 - 3506