A block-based watermarking scheme for image tamper detection and self-recovery

被引:28
作者
Chang, Y. -F. [1 ]
Tai, W. -L. [2 ]
机构
[1] Natl Taichung Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taichung 40306, Taiwan
[2] Chinese Culture Univ, Dept Informat Commun, Taipei 11114, Taiwan
关键词
Fragile watermarking; image authentication; tamper localization; tamper detection; AUTHENTICATION; OWNERSHIP;
D O I
10.2478/s11772-013-0088-4
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we present an effective block-based digital fragile watermarking scheme for image tamper detection and recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. It adopts parity check and the intensity-relation check to thwart various malicious attacks. In the tamper detection process, instead of independently testing the embedded authentication data of each block, we take the block-neighbourhood into account and utilize a hierarchical structure to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively resist collage attack, vector quantization (VQ) attack and constant-average attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully self-recovered with acceptable visual quality.
引用
收藏
页码:182 / 190
页数:9
相关论文
共 29 条
[1]  
[Anonymous], P SPI EINTERNATIONAL
[2]  
[Anonymous], P IEEE INT C IM PROC
[3]  
[Anonymous], P IEEE INT C IM PROC
[4]  
[Anonymous], P IEEE INT C IM PROC
[5]   Image adaptive watermarking using wavelet domain singular value decomposition [J].
Bao, P ;
Ma, XH .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2005, 15 (01) :96-102
[6]   Lossless watermarking for image authentication: A new framework and an implementation [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (04) :1042-1049
[7]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[8]   A watermarking-based image ownership and tampering authentication scheme [J].
Chang, CC ;
Hu, YS ;
Lu, TC .
PATTERN RECOGNITION LETTERS, 2006, 27 (05) :439-446
[9]   Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery [J].
Chang, Chin-Chen ;
Fan, Yi-Hsuan ;
Tai, Wei-Liang .
PATTERN RECOGNITION, 2008, 41 (02) :654-661
[10]  
Dittmann J, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 2, P209, DOI 10.1109/MMCS.1999.778274