A majority-voting based watermarking scheme for color image tamper detection and recovery

被引:53
作者
Wang, Ming-Shi [1 ]
Chen, Wei-Che [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 701, Taiwan
关键词
fragile watermarking; tamper detection; tampered image recovery; majority-voting;
D O I
10.1016/j.csi.2006.11.009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a novel color image watermarking scheme for both tamper detection and tampered image recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. In the tamper detection process, instead of independently examining each embedded authentication data, we take all the authentication data embedded in an image into account and utilize a majority-voting technique to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively thwart collage attack and vector quantization (VQ) attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully recovered with acceptable visual quality. (C) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:561 / 570
页数:10
相关论文
共 22 条
[1]  
[Anonymous], S CONT SEC DAT HID D
[2]  
[Anonymous], 1999, P MULT SEC WORKSH AC
[3]  
Barreto PSLM, 2001, 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P494, DOI 10.1109/ICIP.2001.958536
[4]  
Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
[5]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[6]   Fragile imperceptible digital watermark with privacy control [J].
Coppersmith, D ;
Mintzer, F ;
Tresser, C ;
Wu, CW ;
Yeung, MM .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :79-84
[7]  
Eggers JJ, 2001, INT CONF ACOUST SPEE, P1977, DOI 10.1109/ICASSP.2001.941335
[8]  
Fridrich J, 2000, IEEE IMAGE PROC, P446, DOI 10.1109/ICIP.2000.900991
[9]  
FRIDRICH J, 2000, P SPIE SEC WAT MULT, P428
[10]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441