A hybrid-Sudoku based fragile watermarking scheme for image tampering detection

被引:0
作者
Guo-Dong Su
Chin-Chen Chang
Chih-Cheng Chen
机构
[1] Fujian Province University,Engineering Research Center for ICH Digitalization and Multi
[2] Feng Chia University,source Information Fusion (Fujian Polytechnic Normal University)
[3] Jimei University,Department of Information Engineering and Computer Science
来源
Multimedia Tools and Applications | 2021年 / 80卷
关键词
Fragile watermarking; Hybrid-Sudoku; Double perspective; Tampering detection; Image quality;
D O I
暂无
中图分类号
学科分类号
摘要
Protection of intellectual property rights has become one of the focuses of social concerning. To reduce those disputations, the watermark is implanted into the media by the content owner to declare original copyright. Among which, the high payload can achieve the accurate tampering localization, but maybe bring low visual quality watermarked image. Both accurate tampering localization and high watermarked image quality seem contradictory. For this, this paper proposes a hybrid-Sudoku based fragile watermarking scheme for digital image tampering detection. The hybrid-Sudoku based scheme provides a double perspective mechanism to embed the watermark. In the first perspective of the Sudoku, the watermark is virtually embedded into each pixel pair, resulting in the temporary coordinate information. Then, the temporary coordinate information is concealed into cover image based on the second perspective of the Sudoku. Finally, several common attacks are utilized to evaluate the tampering detection performance of the proposed method. Experimental results show that the proposed scheme can achieve a considerable accuracy in tampering localization and provide the satisfactory visual quality of watermarked image, with PSNR of 47.80 dB. Additionally, the design enhances the security and imperceptive of the hidden watermark.
引用
收藏
页码:12881 / 12903
页数:22
相关论文
共 52 条
[1]  
Ahmed F(2010)A Secure and Robust Hash-Based Scheme for Image Authentication Signal Process 90 1456-1470
[2]  
Siyal MY(2007)An Efficient Image Authentication Method Based on Hamming Code Pattern Recognition 40 681-690
[3]  
Abbas VU(2013)A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection Entropy 15 3170-3185
[4]  
Chan CS(2019)Image Authentication and Tamper Localization Based on Relative Difference between DCT Coefficient and Its Estimated Value Multimed Tools Appl 78 5305-5328
[5]  
Chang CC(2014)Binomial Transform Based Fragile Watermarking for Image Authentication J Information Secur Appl 19 272-281
[6]  
Chen YL(2019)A Novel Hash Function Based Fragile Watermarking Method for Image Integrity Multimed Tools Appl 78 17701-17718
[7]  
Yau HT(2015)A Survey of 5G Network: Architecture and Emerging Technologies IEEE Access 3 1206-1232
[8]  
Yang GJ(2004)Image Content Authentication Using Pinned Sine Transform EURASIP J Advances Signal Process 14 2174-2184
[9]  
Ding W(2013)Probability-Based Tamper Detection Scheme for BTC-Compressed Images Based on Quantization Levels Modification Int J Secur Appl 7 11-32
[10]  
Xie Y(2017)A Novel Hybrid Image Authentication Scheme Based on Absolute Moment Block Truncation Coding Multimed Tools Appl 76 463-488