Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode

被引:60
作者
Qin, Chuan [1 ,2 ]
Wang, Huili [1 ,2 ]
Zhang, Xinpeng [3 ]
Sun, Xingming [4 ]
机构
[1] Univ Shanghai Sci & Technol, Minist Educ, Shanghai Key Lab Modern Opt Syst, Shanghai 200093, Peoples R China
[2] Univ Shanghai Sci & Technol, Minist Educ, Engn Res Ctr Opt Instrument & Syst, Shanghai 200093, Peoples R China
[3] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200072, Peoples R China
[4] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing 210044, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Fragile watermarking; Self-embedding; Embedding mode; Tampering detection; Content recovery; IMAGE TAMPER DETECTION; DIGITAL WATERMARKING; SCHEME; AUTHENTICATION; RECONSTRUCTION; LOCALIZATION; OWNERSHIP; SIGNATURE; RECOVERY; PATTERN;
D O I
10.1016/j.ins.2016.09.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a novel self-embedding fragile image watermarking scheme for tampering recovery based on reference-data interleaving mechanism and adaptive selection of embedding mode. During watermark embedding, reference bits are derived from the interleaved, scrambled MSB bits of original image, and then are combined with authentication bits to form the watermark bits for LSB embedding. Different with the reported schemes with the fixed embedding mode, the proposed scheme not only has two types of embedding modes, i.e., overlapping-free embedding and overlapping embedding, but also utilizes the adaptively flexible numbers of MSB and LSB layers to achieve satisfactory performances for different tampering rates. Also, detailed analyses are given to provide the theoretical values of watermarked-image quality, perfect recovery probability, and recovered-image quality, which are used to conclude the optimal choice of embedding modes. Experimental results show the effectiveness and superiority of the proposed scheme compared with some state-of-the-arts schemes. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:233 / 250
页数:18
相关论文
共 43 条
[1]  
[Anonymous], P C ASS COMP MACH SP
[2]  
[Anonymous], P IEEE
[3]  
[Anonymous], 2012, INF SCI
[4]   Digital image authentication and recovery: Employing integer transform based information embedding and extraction [J].
Chamlawi, Rafiullah ;
Khan, Asifullah .
INFORMATION SCIENCES, 2010, 180 (24) :4909-4928
[5]   A watermarking-based image ownership and tampering authentication scheme [J].
Chang, CC ;
Hu, YS ;
Lu, TC .
PATTERN RECOGNITION LETTERS, 2006, 27 (05) :439-446
[6]  
Fridrich J, 1999, P INT C IM PROC, V3, P792
[7]   Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing [J].
Fu, Zhangjie ;
Sun, Xingming ;
Liu, Qi ;
Zhou, Lu ;
Shu, Jiangang .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (01) :190-200
[8]   Multimedia watermarking techniques [J].
Hartung, F ;
Kutter, M .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1079-1107
[9]  
He HJ, 2006, LECT NOTES COMPUT SC, V4283, P422
[10]   Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme [J].
He, Hongjie ;
Chen, Fan ;
Tai, Heng-Ming ;
Kalker, Ton ;
Zhang, Jiashu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :185-196