An enhanced fragile watermarking scheme to digital image protection and self-recovery

被引:53
作者
Fan, MingQuan [1 ]
Wang, HongXia [1 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Sichuan, Peoples R China
关键词
Image tampering detection; Self-recovery; Tampering discrimination; AUTHENTICATION; DOMAIN;
D O I
10.1016/j.image.2018.04.003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, Sarreshtedari and Akhaee proposed a source-channel coding approach to digital image protection and self-recovery. This scheme is based on set partitioning in hierarchical trees (SPIHT) encoding and Reed- Solomon (RS) code. The total watermark bit-budget includes three parts, the first part is composed of source encoder output bits used for image content self-recovery, the second part is composed of channel code parity bits used for correcting the errors of source encoder output bits, and the last part is composed of check bits used for detecting tampered areas of image. They claimed that their scheme greatly improves image recovery quality as a consequence of the designed source and channel codes. However, we consider that their scheme is ineffective under the condition of tampering channel parity bits. In fact, when attacker tampers image content, the channel parity bits will be generally changed. In this way, using the wrong channel parity bits to perform channel decoding, it will get wrong source coded data and the tampered image content will not be correctly recovered. Besides, their scheme has no tampering discrimination ability. If attacker only tampers the watermark bits, their scheme will still generate tampered-recognized image blocks list. Aiming to resolve these important design vulnerabilities, we propose an enhanced fragile watermarking scheme to digital image protection and self-recovery in this paper. Experimental results show the effectiveness of our proposed scheme.
引用
收藏
页码:19 / 29
页数:11
相关论文
共 12 条
[1]   Authentication and recovery of images using multiple watermarks [J].
Chamlawi, Rafiullah ;
Khan, Asifullah ;
Usman, Imran .
COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) :578-584
[2]   Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain [J].
El'arbi, Maher ;
Ben Amar, Chokri .
IET IMAGE PROCESSING, 2014, 8 (11) :619-626
[3]   A fingerprint-based audio authentication scheme using frequency domain statistical characteristic [J].
Fan, Ming-Quan ;
Wang, Hong-Xia ;
Li, Heng-Jian .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) :2255-2270
[4]   A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform [J].
Fan, Ming-Quan ;
Liu, Pei-Pei ;
Wang, Hong-Xia ;
Li, Heng-Jian .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (12) :2588-2602
[5]   Efficient Method for Content Reconstruction With Self-Embedding [J].
Korus, Pawel ;
Dziech, Andrzej .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2013, 22 (03) :1134-1147
[6]   Image Integrity Authentication Scheme Based on Fixed Point Theory [J].
Li, Xu ;
Sun, Xingming ;
Liu, Quansheng .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (02) :632-645
[7]   Watermarking-based image authentication robust to JPEG compression [J].
Preda, R. O. ;
Vizireanu, D. N. .
ELECTRONICS LETTERS, 2015, 51 (23) :1873-1874
[8]   Watermarking-based Color Image Authentication With Detection And Recovery Capability [J].
Roldan, L. R. ;
Hernandez, M. C. ;
Chao, J. ;
Miyatake, M. N. ;
Meana, H. P. .
IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (02) :1050-1057
[9]   A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery [J].
Sarreshtedari, Saeed ;
Akhaee, Mohammad Ali .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (07) :2266-2277
[10]  
Sreeja M. S., 2016, INT J SCI RES, V5, P1419