Semi-fragile self-recovery watermarking scheme based on data representation through combination

被引:12
作者
Rhayma, Hanen [1 ,2 ]
Makhloufi, Achraf [2 ]
Hamam, Habib [3 ]
Ben Hamida, Ahmed [2 ]
机构
[1] Univ Gabes, ENIG, Gabes 6072, Tunisia
[2] Univ Sfax, ATMS Adv Technol Med & Signals, Enis, Sfax, Tunisia
[3] Univ Moncton, Fac Engn, Moncton, NB E1A 3E9, Canada
关键词
Semi-fragile watermarking; Data representation through combination; DWT; Self-recovery; Localization; Authentication; IMAGE AUTHENTICATION;
D O I
10.1007/s11042-019-7244-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widely available multimedia editing tools and their large reconstruction capabilities make digital multimedia content more sensitive to malicious tampering and manipulations. Therefore, ensuring digital image integrity has become a crucial issue. Watermarking became a popular technique for image authentication. The goal of this paper is to propose a new semi-fragile watermarking scheme for image authentication, localization, and recovery, by using two different watermarks jointly. The embedded information watermark for content recovery is computed from discrete wavelet transform (DWT) approximation coefficients of second level decomposition of the original image and compressed by using Data Representation through Combination (DRC) in order to reduce watermark payload. On another hand, authentication watermark used for both authentication and localization of image tampering is computed by using the block-based watermarking algorithm. Three pseudo-random maps are generated in order to improve the security of the proposed scheme against local attack. Both watermarks are embedded into approximation sub-band of the first wavelet decomposition. Experimental results show that our proposed approach has not only an extremely high accuracy of tampering localization but also a relatively very high recovery rate. Besides, the scheme is able to detect perfectly the difference between malicious attacks and non-malicious attacks such as JPEG compression.
引用
收藏
页码:14067 / 14089
页数:23
相关论文
共 31 条
[1]  
[Anonymous], 2006, Introduction to data compression
[2]  
Boneh Dan, 2015, A Graduate Course in Applied Cryptography
[3]   Authentication and recovery of images using multiple watermarks [J].
Chamlawi, Rafiullah ;
Khan, Asifullah ;
Usman, Imran .
COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) :578-584
[4]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[5]  
Cox IJ, 2008, MKS MULTIMED INFORM, P425, DOI 10.1016/B978-012372585-1.50015-2
[6]   Fragile watermarking tamper detection with images compressed by fuzzy transform [J].
Di Martino, Ferdinando ;
Sessa, Salvatore .
INFORMATION SCIENCES, 2012, 195 :62-90
[7]   Methods for image authentication: a survey [J].
Haouzia, Adil ;
Noumeir, Rita .
MULTIMEDIA TOOLS AND APPLICATIONS, 2008, 39 (01) :1-46
[8]  
He HJ, 2009, LECT NOTES COMPUT SC, V5806, P132
[9]   Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme [J].
He, Hongjie ;
Chen, Fan ;
Tai, Heng-Ming ;
Kalker, Ton ;
Zhang, Jiashu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :185-196
[10]  
Hui Wang, 2012, Digital-Forensics and Watermarking 10th International Workshop, IWDW 2011. Revised Selected Papers, P72, DOI 10.1007/978-3-642-32205-1_8