Self-embedding framework for tamper detection and restoration of color images

被引:5
作者
Hussan, Muzamil [1 ]
Parah, Shabir A. [1 ]
Jan, Aiman [1 ]
Qureshi, G. J. [2 ]
机构
[1] Univ Kashmir, Dept Elect & Instrumentat Technol, Srinagar, India
[2] Higher Educ Dept, Kashmir, Jammu & Kashmir, India
关键词
Watermarking; Tamper detection; Tamper recovery; Image restoration; FRAGILE WATERMARKING SCHEME; AUTHENTICATION; RECONSTRUCTION; PROTECTION; CHAOS;
D O I
10.1007/s11042-022-12545-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The present era is paving huge expansion to the transmission of digital data in fields like health, military intelligence, scientific research, and publication media, etc. The nature of digital data makes it more vulnerable to various intentional and unintentional attacks and hence increases the necessity of verifying its integrity and authenticity. In this paper, a novel image watermarking method for tamper detection and recovery of color images has been proposed. The color image is primarily separated into three planes, and then each plane is divided into four equal halves. We sub-divide each half into 4 x 4 non-overlapping blocks. Further, from a group of four corresponding sub-blocks, a 32-bit watermark comprising of the arithmetic mean value along with the 8-bit data containing the location of the mapped block is generated. This 32-bit generated watermark is embedded into the two least significant bits (LSB) of the mapped block after being encrypted using gray code. The information is embedded in such a way using chaotic sequence such that a full restoration process can be carried out, even if 75% of blocks in any of the three planes get tampered with. This method obtains a high-quality restored image with an average PSNR value of 39.22 dB for the RGB model and 39.37 dB for the YCbCr model. The performance of the proposed method for various collage attacks shows its efficacy over other state-of-art techniques, making it a suitable candidate for the recovery of tampered color images.
引用
收藏
页码:18563 / 18594
页数:32
相关论文
共 51 条
  • [41] Image tamper detection and self-recovery using multiple median watermarking
    Rajput, Vishal
    Ansari, Irshad Ahmad
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (47-48) : 35519 - 35535
  • [42] A logistic map based blind and fragile watermarking for tamper detection and localization in images
    Sahu, Aditya Kumar
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (8) : 3869 - 3881
  • [43] A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery
    Sarreshtedari, Saeed
    Akhaee, Mohammad Ali
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (07) : 2266 - 2277
  • [44] Shivani Shivendra, 2013, Pattern Recognition and Image Analysis. 6th Iberian Conference, IbPRIA 2013. Proceedings. LNCS 7887, P640
  • [45] DCT based efficient fragile watermarking scheme for image authentication and restoration
    Singh, Durgesh
    Singh, Sanjay K.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (01) : 953 - 977
  • [46] IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network
    Stergiou, Christos L.
    Psannis, Konstantinos E.
    Gupta, Brij B.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) : 5164 - 5171
  • [47] A Novel and Efficient Blind Image Watermarking In Transform Domain
    Sunesh
    Kishore, R. Rama
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 1505 - 1514
  • [48] Image self-recovery with watermark self-embedding
    Tai, Wei-Liang
    Liao, Zi-Jun
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 65 : 11 - 25
  • [49] A novel chaos-based fragile watermarking for image tampering detection and self-recovery
    Tong, Xiaojun
    Liu, Yang
    Zhang, Miao
    Chen, Yue
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (03) : 301 - 308
  • [50] Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram
    Yu, Chuying
    Li, Jianzhong
    Li, Xuan
    Ren, Xuechang
    Gupta, B. B.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (04) : 4585 - 4608