Perfect Recovery of Small Tampers Using a Novel Fragile Watermarking Technique Based on Distributed Hamming Code

被引:0
作者
Rasouli, Faeze [1 ]
Taheri, Mohammad [1 ]
机构
[1] Shiraz Univ, Comp Sci & Engn & Informat Technol Dept, Shiraz, Iran
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2022年 / 14卷 / 02期
关键词
Authentication Code; Fragile Watermarking; Hamming Code; Tamper Detection and Recovery; IMAGE AUTHENTICATION METHOD;
D O I
10.22042/ISECURE.2022.284952.670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fragile watermarking is a technique of authenticating the originality of the media (e.g., image). Although the watermark is destroyed with any small modification (tamper), it may be used to recover the original image. There is no method yet, based on our knowledge, to guarantee the perfect recovery of small tampers. Although data-bits are embedded in Least Significant Bits of some other pixel(s), a tamper may destroy both data and authentication sets which makes recovery impossible. In this paper, a novel fragile watermarking scheme is proposed for both tamper detection and tampered image recovery. Here, all bits are reorganized in virtual pixels distributed in the image called as Distributed Pixels (DP). Distance of each pair of bits in a DP is sufficiently large. This is why; tampers smaller than a threshold, cannot destroy more than one bit of a DP. Hamming code guarantees that changing at most one bit can be perfectly detected and recovered. Then, Hamming(7,4) is extended to (8,5) to support embedding in eight-bits pixels. According to the experimental results, the proposed method could perfectly detect and recover the tampered parts not greater than a quarter of image in diameter. It also achieved acceptable performance in other conditions, compared to state-of-the-art methods. (c) 2020 ISC. All rights reserved.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 14 条
  • [1] A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers
    Rasouli, Faeze
    Taheri, Mohammad
    Sarvestani, Reza Rohani
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (02): : 230 - 239
  • [2] A New Fragile Watermarking based on Distributed Hamming Code
    Rasouli, Faeze
    Taheri, Mohammad
    2021 26TH INTERNATIONAL COMPUTER CONFERENCE, COMPUTER SOCIETY OF IRAN (CSICC), 2021,
  • [3] A secure fragile watermarking scheme based on chaos-and-hamming code
    Chang, Chin-Chen
    Chen, Kuo-Nan
    Lee, Chin-Feng
    Liu, Li-Jen
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (09) : 1462 - 1470
  • [4] Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking
    Prasad, Shiv
    Pal, Arup Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (29-30) : 20897 - 20928
  • [5] Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking
    Shiv Prasad
    Arup Kumar Pal
    Multimedia Tools and Applications, 2020, 79 : 20897 - 20928
  • [6] A novel image authentication and recovery algorithm based on chaos and Hamming code
    Wang Xing-Yuan
    Zhang Ji-Ming
    ACTA PHYSICA SINICA, 2014, 63 (02)
  • [7] A novel color image tampering detection and self-recovery based on fragile watermarking
    Xia, Xiaofan
    Zhang, Songsong
    Wang, Kunshu
    Gao, Tiegang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [8] A novel chaos-based fragile watermarking for image tampering detection and self-recovery
    Tong, Xiaojun
    Liu, Yang
    Zhang, Miao
    Chen, Yue
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (03) : 301 - 308
  • [9] Improvement in Error Resilience for Compressed VLSI Test Data using Hamming Code based Technique
    Mehta, Usha Sandeep
    Parmar, Harikrishna
    2015 INTERNATIONAL CONFERENCE ON VLSI SYSTEMS, ARCHITECTURE, TECHNOLOGY AND APPLICATIONS (VLSI-SATA), 2015,
  • [10] Robust watermarking scheme for binary images using a slice-based large-cluster algorithm with a Hamming code
    Chen, WY
    Liu, CC
    OPTICAL ENGINEERING, 2006, 45 (01)