PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A block-based watermarking scheme for image tamper detection and self-recovery

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In this paper, we present an effective block-based digital fragile watermarking scheme for image tamper detection and recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. It adopts parity check and the intensity-relation check to thwart various malicious attacks. In the tamper detection process, instead of independently testing the embedded authentication data of each block, we take the block-neighbourhood into account and utilize a hierarchical structure to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively resist collage attack, vector quantization (VQ) attack and constant-average attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully self-recovered with acceptable visual quality.
Rocznik
Strony
182--190
Opis fizyczny
Bibliogr. 29 poz., rys., il., wykr.
Twórcy
autor
autor
  • Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, 140 Min-Shen Rd., 40306, Taichung, Taiwan, R.O.C.
Bibliografia
  • 1. J. Dittmann, A. Steinmetz, and R. Steinmetz, „Content-based digital signature for motion pictures authentication and content-fragile watermarking”, IEEE Int. Conf. on Multimedia Computing and Systems, pp. 209-213, Florence, 1999.
  • 2. G. I. Friedman, „The trustworthy digital camera: restoring credibility to the photographic image”, Proc. IEEE Int. Conf. on Image Process., pp. 409-413, Chicago, 1998.
  • 3. C. Y. Lin and S. F. Chang, „A robust image authentication method distinguishing JPEG compression from malicious manipulation”, IEEE T. Circ. Syst. Vid. 11, 153-168, (2001).
  • 4. C. Y. Lin and S. F. Chang, „A robust image authentication method surviving JPEG lossy compression”, SPIE 3312, 296-307 (1998).
  • 5. C. S. Lu, H. Y. M. Liao, and C. J. Sze, „Structural digital signature for image authentication: an incidental distortion resistant scheme”, Proc. 8th Multimedia Security Workshop ACM Int. Conf. on Multimedia, pp. 115-118, Los Angeles, 2000.
  • 6. P. Bao and X. Ma, „Image adaptive watermarking using wavelet domain singular value decomposition”, IEEE T. Circ. Syst. Vid. 15, 96-102 (2005).
  • 7. M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, „Hierarchical watermarking for secure image authentication with localization”, IEEE T. Image Process. 11, 585-594 (2002).
  • 8. M. U. Celik, G. Sharma, and A. M. Tekalp, „Lossless watermarking for image authentication: a new framework and an implementation”, IEEE T. Image Process. 15, 1042-1049, (2006).
  • 9. C. C. Chang, Y. S. Hu, and T. C. Lu, „A watermarking-based image ownership and tampering authentication scheme”, Pattern Recogn. Lett. 27, 439-446 (2006).
  • 10. J. Fridrich, „Image watermarking for tamper detection”, Proc. IEEE Int. Conf. on Image Process. 2, pp. 404-408, Chicago, 1998.
  • 11. J. Fridrich, M. Goljan, and A. C. Baldoza, „New fragile authentication watermark for images”, Proc. IEEE Int. Conf. on Image Process. 1, pp. 10-13, Vancouver, 2000.
  • 12. C. T. Hsu and J. L. Wu, „Hidden digital watermarks in images”, IEEE T. Image Process. 8, 58-68 (1999).
  • 13. D. Kundur and D. Hatzinakos, „Toward a telltale watermarking technique for tamper-proofing”, Proc. IEEE Int. Conf. on Image Process. 2, 409-413 (1998).
  • 14. C. S. Lu and H. Y. M. Liao, „Multipurpose watermarking for image authentication and protection”, IEEE T. Image Process. 10, 435-439 (2001).
  • 15. Z. M. Lu, D. G. Xu, and S. H. Sun, „Multipurpose image watermarking algorithm based on multistage vector quantization”, IEEE T. Image Process. 14, 822–831 (2005).
  • 16. K. Maeno, Q. Sun, and S. F. Chang, „New semi-fragile images authentication watermarking techniques using random bias and non-uniform quantization”, IEEE T. Multimedia 8, 32-45 (2006).
  • 17. M. P. Queluz, „Content-based integrity protection of digital image”, Proc. SPIE 3657, 85-93 (1999).
  • 18. M. Schneider and S. F. Chang, „A robust content based digital signature for image authentication”, Proc. IEEE Int. Conf. on Image Process. 3, pp. 227-230, Lausanne, 1996.
  • 19. S. Shan, „Fragile image watermarking using a gradient image for improved localization and security”, Pattern Recogn. Lett. 25, 1893-1903 (2004).
  • 20. P. W. Wong, „A public key watermark for image verification and authentication”, Proc. IEEE Int. Conf. on Image Process. 1, pp. 455-459, Chicago, 1998.
  • 21. P. W. Wong and N. Memon, „Secret an public key image watermarking schemes for image authentication and owner-ship verification”, IEEE T. Image Process. 10, 1593-1601, (2001).
  • 22. Y. Wu and R. H. Deng, „Security of an ill-posed operator for image authentication”, IEEE T. Circ. Syst. Vid. 15, 161-163 (2005).
  • 23. M. M. Yeung and F. Mintizer, „An invisible watermarking technique for image verification”, Proc. IEEE Int. Conf. On Image Process. 1, pp. 680–683, Santa Barbara, 1997.
  • 24. P. L. Lin, C. K. Hsieh, and P. W. Huang, „A hierarchical digital watermarking method for image tamper detection and recovery”, Pattern Recogn. 38, 2519-2529 (2005).
  • 25. M. Holliman and N. Memon, „Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes”, IEEE T. Image Process. 9, 432-441 (2000).
  • 26. C. C. Chang, Y. H. Fan, and W. L. Tai, „Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery”, Pattern Recogn. 41, 654-661 (2008).
  • 27. M. S. Wang and W. C. Chen, „A majority-voting based water-marking scheme for colour image tamper detection and recovery”, Comput. Stand. Inter. 29, 561-570 (2007).
  • 28. T. Y. Lee and S. D. Lin, „Dual watermark for image tamper detection and recovery”, Pattern Recogn. 41, 3497-3506 (2008).
  • 29. C. W. Yang and J. J. Shen, „Recover the tampered image based on VQ indexing”, Signal Process.90, 331-343 (2010).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BWAD-0033-0013
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.