An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network

被引:18
作者
Haghighi, Behrouz Bolourian [1 ,2 ]
Taherinia, Amir Hossein [1 ,2 ]
Monsefi, Reza [1 ,3 ]
机构
[1] Ferdowsi Univ Mashhad, Comp Engn Dept, Mashhad, Razavi Khorasan, Iran
[2] Ferdowsi Univ Mashhad, Machine Vis Lab, Mashhad, Razavi Khorasan, Iran
[3] Ctr Excellence Soft Comp & Intelligent Informat P, Mashhad, Razavi Khorasan, Iran
关键词
Watermarking; Image authentication and restoration; Tamper detection and recovery; Lifting wavelet transform; Halftone technique; Feed-forward neural network; TAMPER DETECTION; SCHEME; ALGORITHM; SVD; LOCALIZATION;
D O I
10.1007/s12559-019-09700-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital watermarking is a significant issue in the field of information security and avoiding the misuse of images in the world of Internet and communication. This paper proposes a novel watermarking method for tamper detection and recovery using semi-fragile data hiding, based on lifting wavelet transform (LWT) and feed-forward neural network (FNN). In this work, first, the host image is decomposed up to one level using LWT, and the discrete cosine transform (DCT) is applied to each 2x2 blocks of diagonal details. Next, a random binary sequence is embedded in each block as the watermark by correlating DC coefficients. In the authentication stage, first, the geometry is analyzed by using speeded up robust features (SURF) algorithm and extract watermark bits by using FNN. Afterward, logical exclusive or operation between original and extracted watermark is applied to detect tampered region. Eventually, in the recovery stage, tampered regions are recovered using the inverse halftoning technique. The performance and efficiency of the method and its robustness against various geometric, non-geometric, and hybrid attacks are reported. From the experimental results, it can be seen that the proposed method is superior in terms of robustness and quality of the watermarked and recovered images, respectively, compared to the state-of-the-art methods. Besides, imperceptibility has been improved by using different correlation steps as the gain factor for flat (smooth) and texture (rough) blocks. Based on the advantages exhibited, the proposed method outperforms the related works, in terms of superiority, efficiency, and effectiveness for tamper detection and recovery-based applications.
引用
收藏
页码:863 / 890
页数:28
相关论文
共 48 条
[1]   A quality guaranteed robust image watermarking optimization with Artificial Bee Colony [J].
Abdelhakim, Assem Mahmoud ;
Saleh, Hassan Ibrahim ;
Nassar, Amin Mohamed .
EXPERT SYSTEMS WITH APPLICATIONS, 2017, 72 :317-326
[2]   A robust image watermarking technique using SVD and differential evolution in DCT domain [J].
Ali, Musrrat ;
Ahn, Chang Wook ;
Pant, Millie .
OPTIK, 2014, 125 (01) :428-434
[3]   An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain [J].
Ali, Musrrat ;
Ahn, Chang Wook .
SIGNAL PROCESSING, 2014, 94 :545-556
[4]  
Axelson P-E, 2003, QUALITY MEASURES HAL
[5]   A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map [J].
Barani, Milad Jafari ;
Valandar, Milad Yousefi ;
Ayubi, Peyman .
OPTIK, 2019, 187 :205-222
[6]   Speeded-Up Robust Features (SURF) [J].
Bay, Herbert ;
Ess, Andreas ;
Tuytelaars, Tinne ;
Van Gool, Luc .
COMPUTER VISION AND IMAGE UNDERSTANDING, 2008, 110 (03) :346-359
[7]   Tamper detection and self-recovery scheme by DWT watermarking [J].
Benrhouma, Oussama ;
Hermassi, Houcemeddine ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2015, 79 (03) :1817-1833
[8]   Hierarchical recovery for tampered images based on watermark self-embedding [J].
Cao, Fang ;
An, Bowen ;
Wang, Jinwei ;
Ye, Dengpan ;
Wang, Huili .
DISPLAYS, 2017, 46 :52-60
[9]   Authentication and recovery of images using multiple watermarks [J].
Chamlawi, Rafiullah ;
Khan, Asifullah ;
Usman, Imran .
COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) :578-584
[10]  
Chetan K. R, 2015, SIRS, P199