Image tamper detection and self-recovery using multiple median watermarking

被引:18
作者
Rajput, Vishal [1 ]
Ansari, Irshad Ahmad [1 ]
机构
[1] PDPM Indian Inst Informat Technol Design & Mfg, Elect & Commun, Jabalpur, MP, India
关键词
Tamper detection; Self-recovery; Median watermarking; Image watermarking; Image security;
D O I
10.1007/s11042-019-07971-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Photographs play a very crucial role in our lives, be it in the field of forensic investigation, military intelligence, scientific research, and publications. Nowadays, most of these photographs are in the digital format; which can be easily edited in any photo editing software without requiring any special knowledge of the field. It has become quite hard to identify whether an image is real or fake. This can be very crucial in the cases of forensic investigation or authorization of images. So, we need a solution, which not only identifies the attacks from different schemes like collage attack, crop attack, etc. but also recovers the edited or tampered portion. In proposed work, 4 reduced-size copy of the original image is hidden in the original image's 4-LSB using four pseudo-random codes. Later on, these copies are used for tamper detection. As image gets tampered, recovery images (which are stored in the 4-LSB's of the original image) also get tampered. So, before recovering the edited portion using the median image (or one out of the four recovery images) various filters like median filters, sharpening filters, and noise removal filters are used to enhance the quality. The proposed scheme recovers the host better than the many recently proposed schemes.
引用
收藏
页码:35519 / 35535
页数:17
相关论文
共 25 条
  • [1] Hierarchical recovery for tampered images based on watermark self-embedding
    Cao, Fang
    An, Bowen
    Wang, Jinwei
    Ye, Dengpan
    Wang, Huili
    [J]. DISPLAYS, 2017, 46 : 52 - 60
  • [2] Hierarchical watermarking for secure image authentication with localization
    Celik, MU
    Sharma, G
    Saber, E
    Tekalp, AM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) : 585 - 595
  • [3] Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
    Chang, Chin-Chen
    Fan, Yi-Hsuan
    Tai, Wei-Liang
    [J]. PATTERN RECOGNITION, 2008, 41 (02) : 654 - 661
  • [4] A block-based watermarking scheme for image tamper detection and self-recovery
    Chang, Y. -F.
    Tai, W. -L.
    [J]. OPTO-ELECTRONICS REVIEW, 2013, 21 (02) : 182 - 190
  • [5] Security of fragile authentication watermarks with localization
    Fridrich, J
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 691 - 700
  • [6] Adjacent-block based statistical detection method for self-embedding watermarking techniques
    He, Hong-Jie
    Zhang, Jia-Shu
    Chen, Fan
    [J]. SIGNAL PROCESSING, 2009, 89 (08) : 1557 - 1566
  • [7] Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme
    He, Hongjie
    Chen, Fan
    Tai, Heng-Ming
    Kalker, Ton
    Zhang, Jiashu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 185 - 196
  • [8] Hore Alain, 2010, Proceedings of the 2010 20th International Conference on Pattern Recognition (ICPR 2010), P2366, DOI 10.1109/ICPR.2010.579
  • [9] Islam M, NEURAL COMPUT APPL, P1
  • [10] An ill-posed operator for secure image authentication
    Izquierdo, E
    Guerra, V
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) : 842 - 852