Self-embedding watermarking scheme for colour images by bi-level moment-preserving technique

被引:9
作者
Liu, Kuo-Cheng [1 ]
机构
[1] Taiwan Hospitality & Tourism Coll, Informat Educ Ctr, Taipei, Taiwan
关键词
TAMPER DETECTION; FRAGILE WATERMARKING; DIGITAL WATERMARKING;
D O I
10.1049/iet-ipr.2013.0284
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this study, the watermarking issue for colour image authentication is presented to resist malicious tampering. The objective of this study is to preserve the colour moments such that the tampered region of the colour image can be recovered with high quality. An input colour image is first partitioned into non-overlapping blocks for watermark embedding. The watermark information embedded into each block consists of the authentication data and the feature information that is given by the bi-level moment-preserving technique. In the proofing process, the authors propose a two-stage dual parity-check method and use morphological operations to prove the validity of the image blocks. The former is proposed to check two set dual authentication data for obtaining better results of tamper proofing and the latter is used to further improve the neighbourhood connectivity of the results. In the recovery process, the feature information of each block is rebuilt for reconstruction. The simulation results show that the proposed self-embedding watermarking scheme is able to effectively prove the tempered region with high detection rate and recover the tempered region with high quality. Meanwhile, the proposed scheme outperforms the relevant existing methods.
引用
收藏
页码:363 / 372
页数:10
相关论文
共 28 条
[1]   Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery [J].
Chang, Chin-Chen ;
Fan, Yi-Hsuan ;
Tai, Wei-Liang .
PATTERN RECOGNITION, 2008, 41 (02) :654-661
[2]   Adjacent-block based statistical detection method for self-embedding watermarking techniques [J].
He, Hong-Jie ;
Zhang, Jia-Shu ;
Chen, Fan .
SIGNAL PROCESSING, 2009, 89 (08) :1557-1566
[3]   Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme [J].
He, Hongjie ;
Chen, Fan ;
Tai, Heng-Ming ;
Kalker, Ton ;
Zhang, Jiashu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :185-196
[4]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[5]   Predictive moment preserving block truncation coding for gray-level image compression [J].
Hu, YC .
JOURNAL OF ELECTRONIC IMAGING, 2004, 13 (04) :871-877
[6]  
Iwata M., 2010, 2010 International Symposium On Information Theory & Its Applications (ISITA 2010), P309, DOI 10.1109/ISITA.2010.5649171
[7]  
Jin XM, 2009, PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, P1, DOI 10.1109/ITNG.2009.10
[8]  
Kostopoulos I, 2002, DSP 2002: 14TH INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING PROCEEDINGS, VOLS 1 AND 2, P733, DOI 10.1109/ICDSP.2002.1028195
[9]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[10]   Dual watermark for image tamper detection and recovery [J].
Lee, Tien-You ;
Lin, Shinfeng D. .
PATTERN RECOGNITION, 2008, 41 (11) :3497-3506