A joint source-channel coding approach to digital image self-recovery

被引:7
作者
Sarreshtedari, Saeed [1 ]
Abbasfar, Aliazam [1 ]
Akhaee, Mohammad Ali [1 ]
机构
[1] Univ Tehran, Dept Elect & Comp Engn, Coll Engn, Tehran 1458889694, Iran
关键词
Image tampering protection; Self-recovery; Joint source-channel coding; FRAGILE WATERMARKING; TRANSMISSION; PROTECTION;
D O I
10.1007/s11760-017-1095-6
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The aim of the digital image self-embedding methods is to restore the content of a tampered image as much as possible. In this article, a joint source-channel coding solution is presented to solve this problem, in which an image compression algorithm is applied to generate a representation of the original image. The preserved information of the original image is used to produce hash bits that help the receiver to find the tampered area. Having the location of tampering known, it can be modeled as an erasure channel. Therefore, a channel coding phase is added to protect the image representation. The limited watermarking bit-budget will be optimally dedicated to the source and channel code bits based on the results derived by solving a dynamic programming optimization problem. It is shown in the experimental results that including this optimization stage results in the superiority of the proposed scheme to the similar state-of-the-art methods who lack such optimization.
引用
收藏
页码:1371 / 1378
页数:8
相关论文
共 18 条
[1]  
[Anonymous], 2010, J DIGITAL FORENSIC P
[2]   Concatenated Block Codes for Unequal Error Protection of Embedded Bit Streams [J].
Arslan, Suayb S. ;
Cosman, Pamela C. ;
Milstein, Laurence B. .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (03) :1111-1122
[3]  
Bas P., 2012, DATASET 2 BOWS CONTE
[4]  
BLAHUT RE, 1985, P IEEE, V73, P874, DOI 10.1109/PROC.1985.13219
[5]   Progressive transmission of images over memoryless noisy channels [J].
Chande, V ;
Farvardin, N .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (06) :850-860
[6]   An effective SVD-based image tampering detection and self-recovery using active watermarking [J].
Dadkhah, Sajjad ;
Abd Manaf, Azizah ;
Hori, Yoshiaki ;
Hassanien, Aboul Ella ;
Sadeghi, Somayeh .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (10) :1197-1210
[7]  
Huang Ke-kun, 2012, Journal of Computer Applications, V32, P732, DOI 10.3724/SP.J.1087.2012.00732
[8]   Error-resilient image and video transmission over the Internet using unequal error protection [J].
Kim, J ;
Mersereau, RM ;
Altunbasak, Y .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2003, 12 (02) :121-131
[9]   Efficient Method for Content Reconstruction With Self-Embedding [J].
Korus, Pawel ;
Dziech, Andrzej .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013, 22 (03) :1134-1147
[10]   A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure [J].
Li, Chunlei ;
Wang, Yunhong ;
Ma, Bin ;
Zhang, Zhaoxiang .
COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (06) :927-940