Reference Sharing Mechanism for Watermark Self-Embedding

被引:139
作者
Zhang, Xinpeng [1 ]
Wang, Shuozhong [1 ]
Qian, Zhenxing [1 ]
Feng, Guorui [1 ]
机构
[1] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200072, Peoples R China
基金
中国国家自然科学基金;
关键词
Fragile watermarking; image authentication; self-embedding; FRAGILE IMAGE WATERMARKING; VIDEO TRANSMISSION; SCHEME; AUTHENTICATION; CONCEALMENT;
D O I
10.1109/TIP.2010.2066981
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes two novel self-embedding watermarking schemes based upon a reference sharing mechanism, in which the watermark to be embedded is a reference derived from the original principal content in different regions and shared by these regions for content restoration. After identifying tampered blocks, both the reference data and the original content in the reserved area are used to recover the principal content in the tampered area. By using the first scheme, the original data in five most significant bit layers of a cover image can be recovered and the original watermarked image can also be retrieved when the content replacement is not too extensive. In the second scheme, the host content is decomposed into three levels, and the reference sharing methods with different restoration capabilities are employed to protect the data at different levels. Therefore, the lower the tampering rate, the more levels of content data are recovered, and the better the quality of restored results.
引用
收藏
页码:485 / 495
页数:11
相关论文
共 21 条
[1]   A robust error concealment technique using data hiding for image and video transmission over lossy channels [J].
Adsumilli, CB ;
Farias, MCQ ;
Mitra, SK ;
Carli, M .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2005, 15 (11) :1394-1406
[2]  
[Anonymous], P 9 ACM INT C MULT O
[3]   Classification-based spatial error concealment for visual communications [J].
Chen, Meng ;
Zheng, Yefeng ;
Wu, Min .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2006, 2006 (1) :1-17
[4]   Invisibility and application functionalities in perceptual watermarking - An overview [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
PROCEEDINGS OF THE IEEE, 2002, 90 (01) :64-77
[5]  
Fridrich J., 1999, P IEEE INT C IM PROC, P792, DOI DOI 10.1109/ICIP.1999.817228
[6]   Image error concealment using watermarking with subbands for wireless channels [J].
Gur, Gurkan ;
Altug, Yucel ;
Anarim, Emin ;
Alagoz, Fatih .
IEEE COMMUNICATIONS LETTERS, 2007, 11 (02) :179-181
[7]   Adjacent-block based statistical detection method for self-embedding watermarking techniques [J].
He, Hong-Jie ;
Zhang, Jia-Shu ;
Chen, Fan .
SIGNAL PROCESSING, 2009, 89 (08) :1557-1566
[8]  
He HJ, 2006, LECT NOTES COMPUT SC, V4283, P422
[9]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[10]   An image fragile watermark scheme based on chaotic image pattern and pixel-pairs [J].
Liu, Shao-Hui ;
Yao, Hong-Xun ;
Gao, Wen ;
Liu, Yong-Liang .
APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (02) :869-882