Image tamper detection and recovery using adaptive embedding rules

被引:35
作者
Hsu, Ching-Sheng [1 ]
Tu, Shu-Fen [2 ]
机构
[1] Ming Chuan Univ, Dept Informat Management, 5 Deming Rd, Taoyuan 333, Taiwan
[2] Chinese Culture Univ, Dept Informat Management, 55 Huagang Rd, Taipei 11114, Taiwan
关键词
Digital watermarking; Fragile watermarking; Image authentication; Tamper detection; FRAGILE WATERMARKING SCHEME; AUTHENTICATION; LOCALIZATION;
D O I
10.1016/j.measurement.2016.03.053
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Many image tamper detection methods implement authentication and recovery in units of blocks; however, these methods do not consider the characteristics of blocks to distinguish watermark embedding and detection modes, thus resulting in poor hiding effects. We suggest that embedding an excessive number of bits within a region with only a slight change in an image to record recovery information is unnecessary. In addition, more recovery information is required in a region with major changes to improve recovery quality. Therefore, this study used smoothness to distinguish the types of image blocks, and employ different watermark embedding, tamper detection, and recovery strategies for different block types to enhance hiding efficiency, authentication, and recovery effects. The experimental results regarding the authentication error rate and image quality showed that the proposed scheme has satisfactory performance. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:287 / 296
页数:10
相关论文
共 23 条
[1]   A NOVEL FRAGILE WATERMARKING BASED ON PARTICLE SWARM OPTIMIZATION [J].
Aslantas, Veysel ;
Ozer, Saban ;
Ozturk, Serkan .
2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, :269-+
[2]   An efficient image authentication method based on Hamming code [J].
Chan, Chi-Shiang ;
Chang, Chin-Chen .
PATTERN RECOGNITION, 2007, 40 (02) :681-690
[3]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[4]   A watermarking-based image ownership and tampering authentication scheme [J].
Chang, CC ;
Hu, YS ;
Lu, TC .
PATTERN RECOGNITION LETTERS, 2006, 27 (05) :439-446
[5]   A quadratic-residue-based fragile watermarking scheme [J].
Chang, Chin-Chen ;
Chen, Kuo-Nan ;
Wang, Zhi-Hui ;
Li, Ming-Chu .
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL I, 2009, :512-+
[6]  
Daxing Zhang, 2010, Proceedings Second International Workshop on Education Technology and Computer Science (ETCS 2010), P228, DOI 10.1109/ETCS.2010.312
[7]  
Dittmann J, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 2, P209, DOI 10.1109/MMCS.1999.778274
[8]   A fragile watermarking scheme for detecting malicious modifications of database relations [J].
Guo, HP ;
Li, YJ ;
Liu, AY ;
Jajodia, S .
INFORMATION SCIENCES, 2006, 176 (10) :1350-1378
[9]   Probability-based tampering detection scheme for digital images [J].
Hsu, Ching-Sheng ;
Tu, Shu-Fen .
OPTICS COMMUNICATIONS, 2010, 283 (09) :1737-1743
[10]  
Katzenbeisser S, 2000, DIGITAL WATERMARKING, P2