Recover the tampered image based on VQ indexing

被引:86
作者
Yang, Chun-Wei [1 ]
Shen, Jau-Ji [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
关键词
Image recovery; Tamper detection; Vector quantization; Watermark; DIGITAL WATERMARKING METHOD; AUTHENTICATION; ROBUST; ALGORITHM;
D O I
10.1016/j.sigpro.2009.07.007
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a tampered image recovery scheme is proposed by creating an index table of the original image via vector quantization (VQ) and embedding it into the original image as a basis for recovery. In order to complete the goal of image authentication and recovery, Wong's watermarking scheme [P.W. Wong, N. Memon, Secret an public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Process 10 (10) (2001) 1593-1601] is employed to perform tamper detection. Wong's watermarking scheme can be used to accurately locate tampered regions. If an image has been tampered, the index table can be used to recover the tampered regions. The experimental results indicate that our scheme has the higher probability of image recovery. Besides, compared with Lee and Lin's I Dual watermark for image tamper detection and recovery, Pattern Recognition 41 (2008) 3497-3506] scheme, our scheme provides not only a better quality of recovered images but also better results at edge regions. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:331 / 343
页数:13
相关论文
共 31 条
[1]  
[Anonymous], 1992, MD5 MESSAGE DIGEST A
[2]  
[Anonymous], P IEEE ICIP CHIC
[3]  
[Anonymous], P SPI EINTERNATIONAL
[4]  
[Anonymous], P IEEE INT C IM PROC
[5]  
[Anonymous], IEEE 6 INT S MULT SO
[6]  
[Anonymous], 2000, P SPIE INT C SEC WAT
[7]   Lossless watermarking for image authentication: A new framework and an implementation [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (04) :1042-1049
[8]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[9]   Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery [J].
Chang, Chin-Chen ;
Fan, Yi-Hsuan ;
Tai, Wei-Liang .
PATTERN RECOGNITION, 2008, 41 (02) :654-661
[10]   A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection [J].
Chen, WY ;
Chen, CH .
PATTERN RECOGNITION, 2005, 38 (04) :587-598