An effective SVD-based image tampering detection and self-recovery using active watermarking

被引:92
作者
Dadkhah, Sajjad [1 ]
Abd Manaf, Azizah [2 ]
Hori, Yoshiaki [3 ]
Hassanien, Aboul Ella [4 ]
Sadeghi, Somayeh [5 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Kuala Lumpur 54100, Malaysia
[2] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur 54100, Malaysia
[3] Saga Univ, Org Gen Educ, Saga 8408502, Japan
[4] Cairo Univ, Dept Informat Technol, Giza, Egypt
[5] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
关键词
SVD; Tamper localization; Self-recovery; Image security; Active watermarking; FRAGILE WATERMARKING; AUTHENTICATION; SCHEME;
D O I
10.1016/j.image.2014.09.001
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, an effective tamper detection and self-recovery algorithm based on singular value decomposition (SVD) is proposed. This method generates two distinct tamper detection keys based on the singular value decomposition of the image blocks. Each generated tamper detection and self-recovery key is distinct for each image block and is encrypted using a secret key. A random block-mapping sequence and three unique optimizations are employed to improve the efficiency of the proposed tamper detection and the robustness against various security attacks, such as collage attack and constant-average attack. To improve the proposed tamper localization, a mixed block-partitioning technique for 4 x 4 and 2 x 2 blocks is utilized. The performance of the proposed scheme and its robustness against various tampering attacks is analyzed. The experimental results demonstrate that the proposed tamper detection is superior in terms of tamper detection efficiency with a tamper detection rate higher than 99%, security robustness and self-recovery image quality for tamper ratio up to 55%. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:1197 / 1210
页数:14
相关论文
共 26 条
  • [1] Authentication and recovery of images using multiple watermarks
    Chamlawi, Rafiullah
    Khan, Asifullah
    Usman, Imran
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) : 578 - 584
  • [2] Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
    Chang, Chin-Chen
    Fan, Yi-Hsuan
    Tai, Wei-Liang
    [J]. PATTERN RECOGNITION, 2008, 41 (02) : 654 - 661
  • [3] A secure fragile watermarking scheme based on chaos-and-hamming code
    Chang, Chin-Chen
    Chen, Kuo-Nan
    Lee, Chin-Feng
    Liu, Li-Jen
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (09) : 1462 - 1470
  • [4] Dadkhah S., 2012, INT J COMPUT SCI ISS, V9
  • [5] Cryptanalysis of the Yeung-Mintzer fragile watermarking technique
    Fridrich, J
    Goljan, M
    Memon, N
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2002, 11 (02) : 262 - 274
  • [6] Hao L., IEICE T INF SYST, V91
  • [7] Hassanien AE, 2014, INTEL SYST REF LIBR, V70, P115, DOI 10.1007/978-3-662-43616-5_5
  • [8] Ho A. T. S., 2005, IGARSS 2005. IEEE International Geoscience and Remote Sensing Symposium
  • [9] Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    Holliman, M
    Memon, N
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) : 432 - 441
  • [10] Huang SC, 2012, J MAR SCI TECH-TAIW, V20, P49