Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication

被引:21
作者
Li, Chunlei [1 ]
Zhang, Aihua [1 ]
Liu, Zhoufeng [1 ]
Liao, Liang [1 ]
Huang, Di [2 ]
机构
[1] Zhongyuan Univ Technol, Sch Elect & Informat Engn, Zhengzhou 450007, Peoples R China
[2] Beihang Univ, Sch Comp Sci & Engn, State Key Lab Software Dev Environm, Beijing 10091, Peoples R China
基金
中国国家自然科学基金;
关键词
Semi-fragile; Self-recoverable; Tamper detection; Group quantization; Double authentication ring; IMAGE TAMPER DETECTION; SCHEME;
D O I
10.1007/s11042-014-2188-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Semi-fragile self-recoverable watermarking algorithms are important to meet various requirements such as security, robustness, localization, and image recovery. However, current approaches are not adequate for this importance. Thus, we propose a novel semi-fragile and self-recoverable watermarking algorithm based on a group quantization and double authentication method. In the proposed algorithm, a target image is first split into 16 x16 image blocks. For each image block, a five-bit authentication watermark is generated from the first-order statistical moment of the block and then is embedded into the mid-frequency band of another image block by a novel group-based wavelet quantization method. With the generated watermarks, image security is enhanced by randomly permuting coefficients among a group and image robustness is improved by embedding the watermark in the largest coefficient inside a sub-group by significant difference parity quantization. The proposed double authentication ring structure effectively improves the image localization accuracy. Recovered image is a better approximate to the original image. Experimental comparisons of ours with other algorithms shows the effectiveness of the proposed self-recoverable and semi-fragile watermarking algorithm.
引用
收藏
页码:10581 / 10604
页数:24
相关论文
共 43 条
  • [1] [Anonymous], MAKING BUSINESS CASE
  • [2] Hierarchical watermarking for secure image authentication with localization
    Celik, MU
    Sharma, G
    Saber, E
    Tekalp, AM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) : 585 - 595
  • [3] Digital image authentication and recovery: Employing integer transform based information embedding and extraction
    Chamlawi, Rafiullah
    Khan, Asifullah
    [J]. INFORMATION SCIENCES, 2010, 180 (24) : 4909 - 4928
  • [4] Authentication and recovery of images using multiple watermarks
    Chamlawi, Rafiullah
    Khan, Asifullah
    Usman, Imran
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) : 578 - 584
  • [5] Chunlei Li, 2012, Advances in Multimedia Information Processing - PCM 2012. 13th Pacific-Rim Conference on Multimedia. Proceedings, P327, DOI 10.1007/978-3-642-34778-8_30
  • [6] Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
    Fridrich, J
    Goljan, M
    Memon, N
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2002, 11 (02) : 262 - 274
  • [7] FRIDRICH J, 1999, CONTENT SECURITY DAT
  • [8] He HJ, 2008, IHW, P137
  • [9] He HJ, 2009, LECT NOTES COMPUT SC, V5806, P132
  • [10] Adjacent-block based statistical detection method for self-embedding watermarking techniques
    He, Hong-Jie
    Zhang, Jia-Shu
    Chen, Fan
    [J]. SIGNAL PROCESSING, 2009, 89 (08) : 1557 - 1566