Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering

被引:0
作者
Assem Abdelhakim
Hassan I. Saleh
Mai Abdelhakim
机构
[1] Egyptian Atomic Energy Authority,Department of Radiation Engineering, National Center for Radiation Research and Technology (NCRRT)
[2] University of Pittsburgh,School of Computing and Information
来源
Multimedia Tools and Applications | 2019年 / 78卷
关键词
Image authentication; Tampering localization; Fragile watermarking; Discrete Cosine Transform; Unsupervised machine learning; K-means clustering;
D O I
暂无
中图分类号
学科分类号
摘要
The continuous development of forgery attacks on critical multimedia applications necessitates having accurate image tamper detection and localization techniques. In this paper, an image authentication approach is designed using a block-based fragile watermarking. Moreover, an effective recovery technique based on unsupervised machine learning is proposed. The authentication data is generated, for each 8 × 8 image block, using the Discrete Cosine Transform. A block dependency is established, for authenticating an image block, through using part of the authentication data of a distant block. Such block-dependency provides more accurate tamper detection and enables precise localization of tampered regions. At the recovery phase, a block is divided into smaller sub-blocks of size 2 × 2, where the recovery data is calculated through the K-means clustering. A fragile watermarking, in the spatial domain, is employed for embedding the watermark that is generated from the authentication and recovery data. We examine the effectiveness of the proposed approach under some of the most common attacks of image tampering, including copy move, constant average, and vector quantization attacks. Our approach is compared with several existing methods. Experimental results show that the proposed technique provides superior tampering detection and localization performance, and is capable of recovering the tampered regions more effectively.
引用
收藏
页码:32523 / 32563
页数:40
相关论文
共 113 条
[1]  
Benrhouma O(2016)Chaotic watermark for blind forgery detection in images Multimed Tools Appl 75 8695-8718
[2]  
Hermassi H(2009)Blind self-authentication of images for robust watermarking using integer wavelet transform AEU-International Journal of Electronics and Communications 63 703-707
[3]  
El-Latif AAA(2017)Hierarchical recovery for tampered images based on watermark self-embedding Displays 46 52-60
[4]  
Belghith S(2002)Hierarchical watermarking for secure image authentication with localization IEEE Trans Image Process 11 585-595
[5]  
Bohra A(2008)Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Pattern Recogn 41 654-661
[6]  
Farooq O(2002)Invisibility and application functionalities in perceptual watermarking an overview Proc IEEE 90 64-77
[7]  
Cao F(2012)Fragile watermarking tamper detection with images compressed by fuzzy transform Inf Sci 195 62-90
[8]  
An B(2014)Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain IET Image Process 8 619-626
[9]  
Wang J(2009)Image forgery detection IEEE Signal Process Mag 26 16-25
[10]  
Ye D(2014)Binomial transform based fragile watermarking for image authentication Journal of Information Security and Applications 19 272-281