Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability

被引:102
作者
Singh, Durgesh [1 ]
Singh, Sanjay K. [1 ]
机构
[1] Indian Inst Technol BHU Varanasi, Dept Comp Sci & Engn, Varanasi 221005, Uttar Pradesh, India
关键词
Fragile watermarking; Image authentication; Tamper localization; Image recovery; Discrete Cosine Transformation; SEMI-FRAGILE WATERMARKING; PARALLEL FRAMEWORK; AUTHENTICATION; HEVC; RECONSTRUCTION; STEGANALYSIS;
D O I
10.1016/j.jvcir.2016.04.023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a Discrete Cosine Transformation (DCT) based effective self-recoverable fragile watermarking scheme. For each 2 x 2 non-overlapping block, two authentication bits, and ten recovery bits are generated from the five most significant bits (MSBs) of pixels. Authentication bits are embedded in the three least significant bits (LSBs) of the block itself while recovery bits are embedded in the three LSBs of the corresponding mapped block. The proposed watermarking scheme is also effective because the authentication of each block is based on two levels hierarchical tampered detection mechanisms. So the detection of tampered block can be ensured with high probability. The experimental results demonstrate that the proposed scheme not only outperforms high-quality restoration effectively, but also removes the blocking artifacts and improves the accuracy of tamper localization due to the use of very small size blocks, smoothing function and two levels tampering detection mechanisms. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:775 / 789
页数:15
相关论文
共 37 条
[1]  
[Anonymous], MULTIMEDIA TOOLS APP
[2]  
[Anonymous], 2008 9 INT C SIGN PR
[3]  
[Anonymous], 2014, MASTERS THESIS
[4]   A new aspect in robust digital watermarking [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan ;
Raman, Balasubramanian .
MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) :179-200
[5]   Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities [J].
Bravo-Solorio, Sergio ;
Nandi, Asoke K. .
SIGNAL PROCESSING, 2011, 91 (04) :728-739
[6]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[7]  
Cox I, 2007, Digital watermarking and steganography
[8]   An effective SVD-based image tampering detection and self-recovery using active watermarking [J].
Dadkhah, Sajjad ;
Abd Manaf, Azizah ;
Hori, Yoshiaki ;
Hassanien, Aboul Ella ;
Sadeghi, Somayeh .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (10) :1197-1210
[9]   THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE [J].
FRIEDMAN, GL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) :905-910
[10]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441