Alterable-capacity fragile watermarking scheme with restoration capability

被引:36
作者
Huo, Yaoran [1 ]
He, Hongjie [1 ]
Chen, Fan [2 ]
机构
[1] SW Jiaotong Univ, Sichuan Key Lab Signal & Informat Proc, Chengdu 610031, Peoples R China
[2] SW Jiaotong Univ, Informat Secur & Natl Comp Grid Lab, Chengdu 610031, Peoples R China
基金
中国国家自然科学基金;
关键词
Fragile watermarking; Alterable capacity; Significant-code; Tamper detection; Content recovery;
D O I
10.1016/j.optcom.2011.12.044
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
To take invisibility and restoration quality into account, this paper proposes an alterable-capacity watermarking scheme. For each block of size 8 x 8 pixels, the alterable-length code is generated based on the roughness of it. The alterable-length watermark generated by the alterable-length code is divided into three parts and embedded in other three blocks based on the secret key. The authenticity of each block is determined by comparing the watermark reconstructed by the block content and the corresponding extracted watermark. To improve the quality of recovered images, two copies of the significant-code of each block are embedded in different blocks and the image inpainting method is adopted to recover the tampered blocks whose significant-code embedded in other blocks is destroyed. The alterable-payload watermark preserves adequate information of image blocks especially for texture images with as few bits as possible and takes into account invisibility, security and restoration quality. Experimental results demonstrate that the proposed scheme improves the quality of watermarked and reconstructed images and is resilient to the known forgery attacks. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:1759 / 1766
页数:8
相关论文
共 13 条
[1]   Invisibility and application functionalities in perceptual watermarking - An overview [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
PROCEEDINGS OF THE IEEE, 2002, 90 (01) :64-77
[2]   Simultaneous cartoon and texture image inpainting using morphological component analysis (MCA) [J].
Elad, M ;
Starck, JL ;
Querre, P ;
Donoho, DL .
APPLIED AND COMPUTATIONAL HARMONIC ANALYSIS, 2005, 19 (03) :340-358
[3]   Cryptanalysis of the Yeung-Mintzer fragile watermarking technique [J].
Fridrich, J ;
Goljan, M ;
Memon, N .
JOURNAL OF ELECTRONIC IMAGING, 2002, 11 (02) :262-274
[4]  
Fridrich J., 1999, S CONT SEC DAT HID D, P1999
[5]  
He H.J., 2008, LNCS, P147
[6]   Adjacent-block based statistical detection method for self-embedding watermarking techniques [J].
He, Hong-Jie ;
Zhang, Jia-Shu ;
Chen, Fan .
SIGNAL PROCESSING, 2009, 89 (08) :1557-1566
[7]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[8]  
Huo Y.R., 2010, IEEE INT C INF THEOR, P608
[9]   Dual watermark for image tamper detection and recovery [J].
Lee, Tien-You ;
Lin, Shinfeng D. .
PATTERN RECOGNITION, 2008, 41 (11) :3497-3506
[10]   Image self-embedding with high-quality restoration capability [J].
Qian, Zhenxing ;
Feng, Guorui ;
Zhang, Xinpeng ;
Wang, Shuozhong .
DIGITAL SIGNAL PROCESSING, 2011, 21 (02) :278-286