Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication

被引:22
作者
Li, Chunlei [1 ]
Zhang, Aihua [1 ]
Liu, Zhoufeng [1 ]
Liao, Liang [1 ]
Huang, Di [2 ]
机构
[1] Zhongyuan Univ Technol, Sch Elect & Informat Engn, Zhengzhou 450007, Peoples R China
[2] Beihang Univ, Sch Comp Sci & Engn, State Key Lab Software Dev Environm, Beijing 10091, Peoples R China
基金
中国国家自然科学基金;
关键词
Semi-fragile; Self-recoverable; Tamper detection; Group quantization; Double authentication ring; IMAGE TAMPER DETECTION; SCHEME;
D O I
10.1007/s11042-014-2188-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Semi-fragile self-recoverable watermarking algorithms are important to meet various requirements such as security, robustness, localization, and image recovery. However, current approaches are not adequate for this importance. Thus, we propose a novel semi-fragile and self-recoverable watermarking algorithm based on a group quantization and double authentication method. In the proposed algorithm, a target image is first split into 16 x16 image blocks. For each image block, a five-bit authentication watermark is generated from the first-order statistical moment of the block and then is embedded into the mid-frequency band of another image block by a novel group-based wavelet quantization method. With the generated watermarks, image security is enhanced by randomly permuting coefficients among a group and image robustness is improved by embedding the watermark in the largest coefficient inside a sub-group by significant difference parity quantization. The proposed double authentication ring structure effectively improves the image localization accuracy. Recovered image is a better approximate to the original image. Experimental comparisons of ours with other algorithms shows the effectiveness of the proposed self-recoverable and semi-fragile watermarking algorithm.
引用
收藏
页码:10581 / 10604
页数:24
相关论文
共 43 条
[1]  
[Anonymous], MAKING BUSINESS CASE
[2]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[3]   Digital image authentication and recovery: Employing integer transform based information embedding and extraction [J].
Chamlawi, Rafiullah ;
Khan, Asifullah .
INFORMATION SCIENCES, 2010, 180 (24) :4909-4928
[4]   Authentication and recovery of images using multiple watermarks [J].
Chamlawi, Rafiullah ;
Khan, Asifullah ;
Usman, Imran .
COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) :578-584
[5]  
Chunlei Li, 2012, Advances in Multimedia Information Processing - PCM 2012. 13th Pacific-Rim Conference on Multimedia. Proceedings, P327, DOI 10.1007/978-3-642-34778-8_30
[6]   Cryptanalysis of the Yeung-Mintzer fragile watermarking technique [J].
Fridrich, J ;
Goljan, M ;
Memon, N .
JOURNAL OF ELECTRONIC IMAGING, 2002, 11 (02) :262-274
[7]  
FRIDRICH J, 1999, CONTENT SECURITY DAT
[8]  
He HJ, 2008, IHW, P137
[9]  
He HJ, 2009, LECT NOTES COMPUT SC, V5806, P132
[10]   Adjacent-block based statistical detection method for self-embedding watermarking techniques [J].
He, Hong-Jie ;
Zhang, Jia-Shu ;
Chen, Fan .
SIGNAL PROCESSING, 2009, 89 (08) :1557-1566