SVD based fragile watermarking scheme for tamper localization and self-recovery

被引:0
作者
Irshad Ahmad Ansari
Millie Pant
Chang Wook Ahn
机构
[1] Indian Institute of Technology Roorkee,Department of ASE
[2] Sungkyunkwan University,Department of CSE
来源
International Journal of Machine Learning and Cybernetics | 2016年 / 7卷
关键词
Fragile watermarking; Tamper localization; Self-recovery; Singular value decomposition; Detection rate;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a novel fragile watermarking approach for digital image tamper localization (TL) along with the self-recovery (SR) capability. The host image is first divided into blocks of size 4 × 4 and then, singular value decomposition is performed on each block. The trace of singular matrix is used to compute the TL bits for each block. These 4 × 4 blocks are further divided into blocks of size 2 × 2 to compute the SR information. This SR information is also used for 2nd level of tamper detection in order to enhance the resolution of TL. Proposed scheme implements a self-embedding of TL bits and mapped embedding of SR bits and for that, block mapping is performed. The encrypted combination of both the codes (TL of parent block + SR of mapped block) is inserted in the 1st and 2nd least significant bits of the parent block. Encryption of watermark bits (unique for each watermarked image) helps it to sustain the block based attacks (vector quantization, collage and four scanning attack). Whereas; two level of authentication helps it to sustain content only and constant average attack. The scheme provides an average detection rate of more than 99.5 % and average recovery of 28 dB for a 50 % tampering. The proposed scheme shows a superior performance, when it is compared with the earlier proposed schemes.
引用
收藏
页码:1225 / 1239
页数:14
相关论文
共 62 条
[1]  
Matsuo T(2004)On parallel hash functions based on block-ciphers IEICE Trans Fundam Electron Commun Comput Sci 87 67-74
[2]  
Kurosawa K(2005)Oblivious signature based envelope Distrib Comput 17 293-302
[3]  
Li N(1997)An invisible watermarking technique for image verification Proc IEEE Int Conf Image Process 2 680-683
[4]  
Wenliang D(2001)Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Trans Image Process 10 1593-1601
[5]  
Boneh D(2004)Fragile image watermarking using a gradient image for improved localization and security Pattern Recogn Lett 25 1893-1903
[6]  
Yeung MM(2003)Structural digital signature for image authentication: an incidental distortion resistant scheme IEEE Trans Multimed 5 161-173
[7]  
Mintzer F(1995)Information authentication for a slippery new age Dr Dobbs J 20 18-26
[8]  
Wong PW(2007)An image fragile watermark scheme based on chaotic image pattern and pixel-pairs Appl Math Comput 185 869-882
[9]  
Memon N(2006)Digital watermarking scheme exploiting nondeterministic dependence for image authentication Opt Eng 45 127001-446
[10]  
Suthaharan S(2006)A watermarking-based image ownership and tampering authentication scheme Pattern Recogn Lett 27 439-1307