A novel pixel-wise authentication-based self-embedding fragile watermarking method

被引:28
作者
Gul, Ertugrul [1 ,2 ]
Ozturk, Serkan [2 ]
机构
[1] Nigde Omer Halisdemir Univ, Comp Engn Dept, TR-51240 Nigde, Turkey
[2] Erciyes Univ, Comp Engn Dept, TR-38039 Kayseri, Turkey
关键词
Self-recovery; Self-embedding; Tamper detection; Pixel-wise; IMAGE TAMPER DETECTION; DIGITAL WATERMARKING; SCHEME; LOCALIZATION; RESTORATION; SECURE;
D O I
10.1007/s00530-021-00751-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Self-embedding fragile watermarking algorithms can perform detection of the manipulated areas as well as recovery of these detected areas. Most of the self-embedding fragile watermarking algorithms are performed block-wise authentication approach. However, entire block is marked as tampered in case one of the pixels in the block is detected as manipulated. This situation decreases the accuracy rate of the authentication process especially against pixel-based attacks such as salt and paper noise adding. Therefore, we present a novel pixel-wise authentication-based self-embedding fragile watermarking method for manipulation detection and recovery. In this proposed method, reference image is divided into four main blocks. Then, each main block is subdivided into 2x4 or 4x2 sized blocks according to block type determined using recovery quality. Recovery bits of each main block generated from sub-blocks are spreaded into the two main blocks in the other half of the image. For each pixel, two authentication bits are generated using the six most significant bits of the pixel with two pixel position bits and then embedded into the first and second least significant bits of the pixel. In experimental results, pixel-based attacks are applied to the images to demonstrate the success of the presented method. Also, performance of the presented method has been evaluated by applying different size of cropping attacks to the watermarked images. Experimental results show that the proposed method satisfactory detect and recover the manipulated areas.
引用
收藏
页码:531 / 545
页数:15
相关论文
共 34 条
[1]   SVD based fragile watermarking scheme for tamper localization and self-recovery [J].
Ansari, Irshad Ahmad ;
Pant, Millie ;
Ahn, Chang Wook .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) :1225-1239
[2]   Fast fragile watermark embedding and iterative mechanism with high self-restoration performance [J].
Bravo-Solorio, Sergio ;
Calderon, Felix ;
Li, Chang-Tsun ;
Nandi, Asoke K. .
DIGITAL SIGNAL PROCESSING, 2018, 73 :83-92
[3]   Hierarchical recovery for tampered images based on watermark self-embedding [J].
Cao, Fang ;
An, Bowen ;
Wang, Jinwei ;
Ye, Dengpan ;
Wang, Huili .
DISPLAYS, 2017, 46 :52-60
[4]   A fuzzy c-means clustering-based fragile watermarking scheme for image authentication [J].
Chen, Wei-Che ;
Wang, Ming-Shi .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) :1300-1307
[5]   An adaptive image authentication scheme for vector quantization compressed image [J].
Chuang, Jun-Chou ;
Hu, Yu-Chen .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2011, 22 (05) :440-449
[6]   Fragile watermarking tamper detection with images compressed by fuzzy transform [J].
Di Martino, Ferdinando ;
Sessa, Salvatore .
INFORMATION SCIENCES, 2012, 195 :62-90
[7]   A novel hash function based fragile watermarking method for image integrity [J].
Gul, Ertugrul ;
Ozturk, Serkan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (13) :17701-17718
[8]   A divide-and-conquer fragile self-embedding watermarking with adaptive payload [J].
Huang, Rong ;
Liu, Hao ;
Liao, Xiaojuan ;
Sun, Shaoyuan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (18) :26701-26727
[9]   Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC [J].
Kim, Cheonshik ;
Shin, Dongkyoo ;
Yang, Ching-Nung .
PERSONAL AND UBIQUITOUS COMPUTING, 2018, 22 (01) :11-22
[10]   Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery [J].
Lee, Chin-Feng ;
Shen, Jau-Ji ;
Chen, Zhao-Ru ;
Agrawal, Somya .
SENSORS, 2019, 19 (10)