Fast fragile watermark embedding and iterative mechanism with high self-restoration performance

被引:36
作者
Bravo-Solorio, Sergio [1 ]
Calderon, Felix [2 ]
Li, Chang-Tsun [3 ]
Nandi, Asoke K. [4 ]
机构
[1] DEIPI COM SA CV, Res & Innovat Dept, Mexico City, DF, Mexico
[2] Univ Michoacana, Div Estudios Posgrad, Fac Ingn Elect, Santiago Tapia 403, Morelia 58000, Michoacan, Mexico
[3] Charles Sturt Univ, Sch Comp & Math, Wagga Wagga, NSW 2650, Australia
[4] Brunel Univ London, Dept Elect & Comp Engn, London, England
基金
英国工程与自然科学研究理事会;
关键词
Fragile watermarking; Self-restoration; Image authentication; Erasure channel; Tornado codes; IMAGE AUTHENTICATION; SCHEME;
D O I
10.1016/j.dsp.2017.11.005
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a new algorithm to reduce significantly the computational cost of one of the best methods with self-recovery capabilities in the fragile watermarking literature. This is achieved by generating two sequences of reference bits associated to the 5 most significant bit-planes (MSBPs) of the image. The reference bits and some authentication bits are then allocated to the 3 least significant bit-planes (LSBPs) of the image. The receiver uses the authentication bits to localise altered pixel blocks and then executes an iterative restoration mechanism to calculate the original value of the watermarked pixels. Experimental results demonstrate that the embedding method executes significantly faster compared to the state-of-the-art method while achieving a high restoration performance. (C) 2017 The Author(s). Published by Elsevier Inc.
引用
收藏
页码:83 / 92
页数:10
相关论文
共 30 条
  • [11] A self-recovery fragile watermarking scheme for image authentication with superior localization
    He HongJie
    Zhang JiaShu
    Chen Fan
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (10): : 1487 - 1507
  • [12] Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme
    He, Hongjie
    Chen, Fan
    Tai, Heng-Ming
    Kalker, Ton
    Zhang, Jiashu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 185 - 196
  • [13] Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    Holliman, M
    Memon, N
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) : 432 - 441
  • [14] Korus P, 2014, IEEE INT WORKS INFOR, P36, DOI 10.1109/WIFS.2014.7084300
  • [15] Authentication and correction of digital watermarking images
    Lee, J
    Won, CS
    [J]. ELECTRONICS LETTERS, 1999, 35 (11) : 886 - 887
  • [16] Lee J, 2000, 2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, P1297, DOI 10.1109/ICME.2000.871004
  • [17] Wavelet-based fragile watermarking scheme for image authentication
    Li, Chang-Tsun
    Si, Huayin
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2007, 16 (01)
  • [18] Image Integrity Authentication Scheme Based on Fixed Point Theory
    Li, Xu
    Sun, Xingming
    Liu, Quansheng
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (02) : 632 - 645
  • [19] A hierarchical digital watermarking method for image tamper detection and recovery
    Lin, PL
    Hsieh, CK
    Huang, PW
    [J]. PATTERN RECOGNITION, 2005, 38 (12) : 2519 - 2529
  • [20] Luby M, 1998, LECT NOTES COMPUT SC, V1518, P171