A New Fragile Watermarking based on Distributed Hamming Code

被引:1
作者
Rasouli, Faeze [1 ]
Taheri, Mohammad [1 ]
机构
[1] Shiraz Univ, Comp Sci & Eng & Inf Tech Dept, Shiraz, Iran
来源
2021 26TH INTERNATIONAL COMPUTER CONFERENCE, COMPUTER SOCIETY OF IRAN (CSICC) | 2021年
关键词
Authentication code; Fragile watermarking; Hamming code; Tamper detection and recovery; IMAGE AUTHENTICATION METHOD; TAMPER DETECTION;
D O I
10.1109/CSICC52343.2021.9420541
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, a novel fragile watermarking scheme is proposed for both tamper detection and tampered image recovery based on Hamming code. To serve this purpose, the authentication code (check bits) is computed using Hamming code from data bits. In this work, data bits were selected from the five Most Significant Bits (5_MSB) of the pixel values and authentication code is embedded into the three Least Significant Bits (3LSBs) to preserve image quality. Hamming (7,4) has been extended, in this paper, to (8,5) and is used for embedding, error detection and correction. Each instance of coding is applied on eight pixels (one bit per pixel) located in sufficient far parts of the image. Hence, for tampers smaller than a threshold, the recovery can be done perfectly. According to the experimental results, the proposed method achieves better performance in terms of recovering the tampered areas, compared to state-of-the- art.
引用
收藏
页数:5
相关论文
共 12 条
  • [1] SVD based fragile watermarking scheme for tamper localization and self-recovery
    Ansari, Irshad Ahmad
    Pant, Millie
    Ahn, Chang Wook
    [J]. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) : 1225 - 1239
  • [2] Chaluvadi Surya Bhagavan, 2009, Proceedings of the 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC 2009), P993, DOI 10.1109/NABIC.2009.5393888
  • [3] An efficient image authentication method based on Hamming code
    Chan, Chi-Shiang
    Chang, Chin-Chen
    [J]. PATTERN RECOGNITION, 2007, 40 (02) : 681 - 690
  • [4] An image authentication method by applying Hamming code on rearranged bits
    Chan, Chi-Shiang
    [J]. PATTERN RECOGNITION LETTERS, 2011, 32 (14) : 1679 - 1690
  • [5] ERROR DETECTING AND ERROR CORRECTING CODES
    HAMMING, RW
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1950, 29 (02): : 147 - 160
  • [6] Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain
    Kang, Xiaobing
    Chen, Yajun
    Zhao, Fan
    Lin, Guangfeng
    [J]. SOFT COMPUTING, 2020, 24 (14) : 10561 - 10584
  • [7] Dual watermark for image tamper detection and recovery
    Lee, Tien-You
    Lin, Shinfeng D.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3497 - 3506
  • [8] A hierarchical digital watermarking method for image tamper detection and recovery
    Lin, PL
    Hsieh, CK
    Huang, PW
    [J]. PATTERN RECOGNITION, 2005, 38 (12) : 2519 - 2529
  • [9] Large scale image tamper detection and restoration
    Sarkar, D.
    Palit, S.
    Som, S.
    Dey, K. N.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (25-26) : 17761 - 17791
  • [10] Sikder I, 2017, 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION ENGINEERING (ECCE), P881, DOI 10.1109/ECACE.2017.7913027