SVD based fragile watermarking scheme for tamper localization and self-recovery

被引:0
作者
Irshad Ahmad Ansari
Millie Pant
Chang Wook Ahn
机构
[1] Indian Institute of Technology Roorkee,Department of ASE
[2] Sungkyunkwan University,Department of CSE
来源
International Journal of Machine Learning and Cybernetics | 2016年 / 7卷
关键词
Fragile watermarking; Tamper localization; Self-recovery; Singular value decomposition; Detection rate;
D O I
暂无
中图分类号
学科分类号
摘要
This paper proposes a novel fragile watermarking approach for digital image tamper localization (TL) along with the self-recovery (SR) capability. The host image is first divided into blocks of size 4 × 4 and then, singular value decomposition is performed on each block. The trace of singular matrix is used to compute the TL bits for each block. These 4 × 4 blocks are further divided into blocks of size 2 × 2 to compute the SR information. This SR information is also used for 2nd level of tamper detection in order to enhance the resolution of TL. Proposed scheme implements a self-embedding of TL bits and mapped embedding of SR bits and for that, block mapping is performed. The encrypted combination of both the codes (TL of parent block + SR of mapped block) is inserted in the 1st and 2nd least significant bits of the parent block. Encryption of watermark bits (unique for each watermarked image) helps it to sustain the block based attacks (vector quantization, collage and four scanning attack). Whereas; two level of authentication helps it to sustain content only and constant average attack. The scheme provides an average detection rate of more than 99.5 % and average recovery of 28 dB for a 50 % tampering. The proposed scheme shows a superior performance, when it is compared with the earlier proposed schemes.
引用
收藏
页码:1225 / 1239
页数:14
相关论文
共 62 条
[21]  
Chen WC(2008)Dual watermark for image tamper detection and recovery Pattern Recogn 41 3497-739
[22]  
Wang MS(2012)A color image authentication and recovery method using block truncation code embedding [J] J Mar Sci Technol 20 49-308
[23]  
Holliman M(2011)Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities Signal Process 91 728-441
[24]  
Memon N(2013)A novel chaos based fragile watermarking for image tampering detection and self-recovery Signal Process Image Commun 28 301-661
[25]  
Rawat S(2000)Counterfeiting attacks on oblivious block- wise independent invisible watermarking schemes IEEE Trans Image Process 9 432-745
[26]  
Raman B(2008)Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Pattern Recogn 41 654-undefined
[27]  
Zhang X(2014)A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition SIViP 9 735-undefined
[28]  
Wang S(undefined)undefined undefined undefined undefined-undefined
[29]  
Rosales-Roldan L(undefined)undefined undefined undefined undefined-undefined
[30]  
Cedillo-Hernandez M(undefined)undefined undefined undefined undefined-undefined