A divide-and-conquer fragile self-embedding watermarking with adaptive payload

被引:15
作者
Huang, Rong [1 ,2 ]
Liu, Hao [1 ,2 ]
Liao, Xiaojuan [3 ]
Sun, Shaoyuan [1 ,2 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai, Peoples R China
[2] Minist Educ, Engn Res Ctr Digitized Text & Apparel Technol, Beijing, Peoples R China
[3] Chengdu Univ Technol, Sch Cyber Secur, Chengdu, Sichuan, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Self-embedding; Fragile watermarking; Image authentication; Content restoration; IMAGE TAMPER DETECTION; RECOVERY; AUTHENTICATION; RECONSTRUCTION; MECHANISM; SELECTION;
D O I
10.1007/s11042-019-07802-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a divide-and-conquer fragile self-embedding watermarking with adaptive payload for digital images. A graph-based visual saliency (GBVS) model is adopted to automatically classify image blocks into region of interest (ROI) and background (ROB). The divide-and-conquer mechanisms aim to protect the ROI blocks with higher priority, which is embodied in two procedures: backup information collection and payload allocation. We collect the ROI backup information without compression, and allocate payload in a water-filling order to preferentially maintain the visual quality of ROI. The collected backup information are encoded as reference bits through a measurement process, in which a flexible scaling factor adaptively modulates the size of payload. Auxiliary information, which records the ROI locations, is embedded into the host images together with the reference bits. Hash-based authentication bits are responsible for detecting tampered blocks. A legitimate recipient can sequentially restore the auxiliary information and the original image content as long as the tampering is not too severe. The qualitative and quantitative results demonstrate the effectiveness and the superiority of the proposed methods compared with the previous works.
引用
收藏
页码:26701 / 26727
页数:27
相关论文
共 42 条
[1]   Fast fragile watermark embedding and iterative mechanism with high self-restoration performance [J].
Bravo-Solorio, Sergio ;
Calderon, Felix ;
Li, Chang-Tsun ;
Nandi, Asoke K. .
DIGITAL SIGNAL PROCESSING, 2018, 73 :83-92
[2]   Hierarchical recovery for tampered images based on watermark self-embedding [J].
Cao, Fang ;
An, Bowen ;
Wang, Jinwei ;
Ye, Dengpan ;
Wang, Huili .
DISPLAYS, 2017, 46 :52-60
[3]   Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery [J].
Chang, Chin-Chen ;
Fan, Yi-Hsuan ;
Tai, Wei-Liang .
PATTERN RECOGNITION, 2008, 41 (02) :654-661
[4]  
Chen F, 2011, P 10 INT C DIG FOR W, P142
[5]   Chaos-based self-embedding fragile watermarking with flexible watermark payload [J].
Chen, Fan ;
He, Hongjie ;
Tai, Heng-Ming ;
Wang, Hongxia .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (01) :41-56
[6]  
Fridrich J., 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348), P792, DOI 10.1109/ICIP.1999.817228
[7]   TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique [J].
Haghighi, Behrouz Bolourian ;
Taherinia, Amir Hossein ;
Harati, Ahad .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2018, 50 :49-64
[8]  
Harel J, 2006, ADV NEURAL INFORM PR, P545, DOI DOI 10.7551/MITPRESS/7503.001.0001
[9]  
He HJ, 2009, LECT NOTES COMPUT SC, V5806, P132
[10]   Adjacent-block based statistical detection method for self-embedding watermarking techniques [J].
He, Hong-Jie ;
Zhang, Jia-Shu ;
Chen, Fan .
SIGNAL PROCESSING, 2009, 89 (08) :1557-1566