Image Fragile Watermarking with Two Authentication Components for Tamper Detection and Recovery

被引:0
作者
Rakhmawati, Lusia [1 ,2 ]
Wirawan [1 ]
Suwadi [1 ]
机构
[1] Inst Teknol Sepuluh Nopember, Fac Elect Technol, Dept Elect Engn, Surabaya, Indonesia
[2] Univ Negeri Surabaya, Fac Engn, Dept Elect Engn, Surabaya, Indonesia
来源
2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AUTONOMOUS SYSTEMS (ICOIAS) | 2018年
关键词
fragile watermarking; tamper detection; tamper recovery; SCHEME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study developed a new fragile watermarking method that utilizes the image feature as a watermark component to be inserted into the image itself. There are two watermark components, for the process of tamper detection and recovery. In this scheme, the original image is split into multiple blocks of uniform size and lookup tables for random blocks are generated using the 1-D transformation algorithm. In the process of watermark generation for tamper detection, we used parity bit for 5 MSB and the average block for 2x2 pixel image, this last process resulted in two check bits generated by random key with a certain size. The watermark is then inserted into three least significant bits, where the watermark used authentication is inserted in the original pixel, while for bit recovery is inserted into the appropriate mapping blocks. In decoding, feature information as a watermark is reconstructed and the watermark image is recovered based on reconstructed data along with some other post-processing methods. When compared with the previous method indicates that this algorithm can improve image quality.
引用
收藏
页码:35 / 38
页数:4
相关论文
共 11 条
[1]  
[Anonymous], 2015, 2015 12 INT C EL ENG
[2]   A secure image authentication scheme for tamper detection and recovery [J].
Chen, T-Y ;
Hwang, M-S ;
Jan, J-K .
IMAGING SCIENCE JOURNAL, 2012, 60 (04) :219-233
[3]  
Chen T, 2012, 2012 IEEE FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), P872, DOI 10.1109/ICACI.2012.6463294
[4]  
Chetan KR, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P1494, DOI 10.1109/ICACCI.2014.6968624
[5]   Self Embedding Fragile Watermarking for Image Tampering Detection and Image Recovery using Self Recovery Blocks [J].
Dhole, Vinayak S. ;
Patil, Nitin N. .
1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, :752-757
[6]   Dual Watermarking for Image Tamper Detection and Self-recovery [J].
Han, Qi ;
Han, Lei ;
Wang, Erfu ;
Yang, Jie .
2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, :33-36
[7]   Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme [J].
He, Hongjie ;
Chen, Fan ;
Tai, Heng-Ming ;
Kalker, Ton ;
Zhang, Jiashu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :185-196
[8]  
Jun-Dong Chang, 2013, 2013 2nd International Symposium on Next-Generation Electronics (ISNE 2013), P173, DOI 10.1109/ISNE.2013.6512330
[9]   A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization [J].
Qi, Xiaojun ;
Xin, Xing .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 30 :312-327
[10]   A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery [J].
Sarreshtedari, Saeed ;
Akhaee, Mohammad Ali .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (07) :2266-2277