A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization

被引:63
作者
Qi, Xiaojun [1 ]
Xin, Xing [1 ]
机构
[1] Utah State Univ, Dept Comp Sci, Logan, UT 84322 USA
关键词
Adaptive quantization; Authentication measures; Tampered error map; Semi-fragile watermarking; Singular value decomposition; Wavelet transform; Content-dependent watermark; Strongly tampered error map; Mildly tampered error map; RECOVERY;
D O I
10.1016/j.jvcir.2015.05.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a singular-value-based semi-fragile watermarking scheme for image content authentication. The proposed scheme generates secure watermark by performing a logical operation on content-dependent watermark generated by a singular-value-based sequence and content-independent watermark generated by a private-key-based sequence. It next employs the adaptive quantization method to embed secure watermark in approximation subband of each 4 x 4 block to generate the watermarked image. The watermark extraction process then extracts watermark using the parity of quantization results from the probe image. The authentication process starts with regenerating secure watermark following the same process. It then constructs error maps to compute five authentication measures and performs a three-level process to authenticate image content and localize tampered areas. Extensive experimental results show that the proposed scheme outperforms five peer schemes and its two variant systems and is capable of identifying intentional tampering, incidental modification, and localizing tampered regions under mild to severe content-preserving modifications. (C) 2015 Elsevier Inc. All rights reserved.
引用
收藏
页码:312 / 327
页数:16
相关论文
共 29 条
[1]   Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique [J].
Al-Otum, Hazem Munawer .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1064-1081
[2]   Digital image authentication and recovery: Employing integer transform based information embedding and extraction [J].
Chamlawi, Rafiullah ;
Khan, Asifullah .
INFORMATION SCIENCES, 2010, 180 (24) :4909-4928
[3]  
Che SB, 2007, INT C WAVEL ANAL PAT, P382
[4]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[5]  
Chunlei Li, 2012, Advances in Multimedia Information Processing - PCM 2012. 13th Pacific-Rim Conference on Multimedia. Proceedings, P327, DOI 10.1007/978-3-642-34778-8_30
[6]  
Cox IJ, 2008, MKS MULTIMED INFORM, P425, DOI 10.1016/B978-012372585-1.50015-2
[7]   Image Content Authentication System Based on Semi-Fragile Watermarking [J].
Cruz, Clara ;
Reyes, Rogelio ;
Nakano, Mariko ;
Perez, Hector .
2008 51ST MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2008, :306-309
[8]  
Ho CK, 2004, ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, P7
[9]   ALGEBRAIC FEATURE-EXTRACTION OF IMAGE FOR RECOGNITION [J].
HONG, ZQ .
PATTERN RECOGNITION, 1991, 24 (03) :211-219
[10]  
Hu YP, 2005, PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, P5484