Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities

被引:47
作者
Bravo-Solorio, Sergio [1 ]
Nandi, Asoke K. [1 ]
机构
[1] Univ Liverpool, Dept Elect Engn & Elect, Liverpool L69 3GJ, Merseyside, England
关键词
Fragile watermarking; Tampering localisation; Self-recovery; Security; SCHEME;
D O I
10.1016/j.sigpro.2010.07.019
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we present a new fragile watermarking method aimed at providing improved tampering localisation and self-recovery capabilities. First, a secure block-wise mechanism, resilient to cropping, is used to localise distorted blocks of pixels. Subsequently, the tampering localisation accuracy is refined by means of an iterative pixel-wise mechanism, which estimates the original watermarked pixels in altered regions. Extensive tests, using a large data-set, are presented to show to what extent the size of the tampered area influences the performance of our method. Moreover, results show that the proposed scheme compares favourably with a method presented in recent literature, in terms of tampering localisation and self-recovery performance. In fact, we show that our method is capable of partially reconstructing a cover image when 5% of its total number of pixels has been cropped. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:728 / 739
页数:12
相关论文
共 19 条
  • [1] [Anonymous], 2002, FIPS PUB and FIPS, V180-2, P180
  • [2] Toward secure public-key blockwise fragile authentication watermarking
    Barreto, PSLM
    Kim, HY
    Rijmen, V
    [J]. IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02): : 57 - 62
  • [3] Hierarchical watermarking for secure image authentication with localization
    Celik, MU
    Sharma, G
    Saber, E
    Tekalp, AM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) : 585 - 595
  • [4] Cox IJ, 2008, MKS MULTIMED INFORM, P1
  • [5] Security of fragile authentication watermarks with localization
    Fridrich, J
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 691 - 700
  • [6] Griffin G., 2007, Caltech-256 object category dataset
  • [7] Adjacent-block based statistical detection method for self-embedding watermarking techniques
    He, Hong-Jie
    Zhang, Jia-Shu
    Chen, Fan
    [J]. SIGNAL PROCESSING, 2009, 89 (08) : 1557 - 1566
  • [8] A self-recovery fragile watermarking scheme for image authentication with superior localization
    He HongJie
    Zhang JiaShu
    Chen Fan
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (10): : 1487 - 1507
  • [9] Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    Holliman, M
    Memon, N
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) : 432 - 441
  • [10] Dual watermark for image tamper detection and recovery
    Lee, Tien-You
    Lin, Shinfeng D.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3497 - 3506