DOI QR코드

DOI QR Code

Review on Self-embedding Fragile Watermarking for Image Authentication and Self-recovery

  • Wang, Chengyou (School of Mechanical, Electrical and Information Engineering, Shandong University) ;
  • Zhang, Heng (School of Mechanical, Electrical and Information Engineering, Shandong University) ;
  • Zhou, Xiao (School of Mechanical, Electrical and Information Engineering, Shandong University)
  • Received : 2017.02.17
  • Accepted : 2017.05.31
  • Published : 2018.04.30

Abstract

As the major source of information, digital images play an indispensable role in our lives. However, with the development of image processing techniques, people can optionally retouch or even forge an image by using image processing software. Therefore, the authenticity and integrity of digital images are facing severe challenge. To resolve this issue, the fragile watermarking schemes for image authentication have been proposed. According to different purposes, the fragile watermarking can be divided into two categories: fragile watermarking for tamper localization and fragile watermarking with recovery ability. The fragile watermarking for image tamper localization can only identify and locate the tampered regions, but it cannot further restore the modified regions. In some cases, image recovery for tampered regions is very essential. Generally, the fragile watermarking for image authentication and recovery includes three procedures: watermark generation and embedding, tamper localization, and image self-recovery. In this article, we make a review on self-embedding fragile watermarking methods. The basic model and the evaluation indexes of this watermarking scheme are presented in this paper. Some related works proposed in recent years and their advantages and disadvantages are described in detail to help the future research in this field. Based on the analysis, we give the future research prospects and suggestions in the end.

Keywords

References

  1. D. C. Lou and J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31-39, 2000. https://doi.org/10.1109/30.826378
  2. C. S. Lu and H. Y. M. Liao, "Structural digital signature for image authentication: an incidental distortion resistant scheme," IEEE Transactions on Multimedia, vol. 5, no. 2, pp. 161-173, 2003. https://doi.org/10.1109/TMM.2003.811621
  3. H. Nyeem, W. Boles, and C. Boyd, "Digital image watermarking: its formal model, fundamental properties and possible attacks," EURASIP Journal on Advances in Signal Processing, vol. 2014, no. 1, pp. 1-22, 2014. https://doi.org/10.1186/1687-6180-2014-1
  4. S. Bekkouch and K. M. Faraoun, "Robust and reversible image watermarking scheme using combined DCTDWT-SVD transforms," Journal of Information Processing Systems, vol. 11, no. 3, pp. 406-420, 2015. https://doi.org/10.3745/JIPS.02.0021
  5. K. Sreenivas and V. K. Prasad, "Fragile watermarking schemes for image authentication: a survey," International Journal of Machine Learning and Cybernetics, vol. 8, pp. 1-26, 2017. https://doi.org/10.1007/s13042-016-0600-5
  6. J. Fridrich, M. Goljan, and N. Memon, "Cryptanalysis of the Yeung-Mintzer fragile watermarking technique," Journal of Electronic Imaging, vol. 11, no. 2, pp. 262-274, 2002. https://doi.org/10.1117/1.1459449
  7. C. C. Chang, Y. H. Fan, and W. L. Tai, "Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 2, pp. 654-661, 2008. https://doi.org/10.1016/j.patcog.2007.06.003
  8. M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432-441, 2000. https://doi.org/10.1109/83.826780
  9. H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking based on LBP for blind tamper detection in images," Journal of Information Processing Systems, vol. 13, no. 2, pp. 385-399, 2017. https://doi.org/10.3745/JIPS.03.0070
  10. Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity," IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004. https://doi.org/10.1109/TIP.2003.819861
  11. H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking for image authentication using the characteristic of SVD," Algorithms, vol. 10, no. 1, article no. 27, 2017.
  12. O. Benrhouma, H. Hermassi, and S. Belghith, "Tamper detection and self-recovery scheme by DWT watermarking," Nonlinear Dynamics, vol. 79, no. 3, pp. 1817-1833, 2015. https://doi.org/10.1007/s11071-014-1777-3
  13. J. Fridrich and M. Goljan, "Images with self-correcting capabilities," in Proceedings of the International Conference on Image Processing, Kobe, Japan, 1999, pp. 792-796.
  14. P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005. https://doi.org/10.1016/j.patcog.2005.02.007
  15. Y. F. Chang and W. L. Tai, "A block-based watermarking scheme for image tamper detection and self-recovery," Opto-Electronics Review, vol. 21, no. 2, pp. 182-190, 2013.
  16. X. J. Tong, Y. Liu, M. Zhang, and Y. Chen, "A novel chaos-based fragile watermarking for image tampering detection and self-recovery," Signal Processing: Image Communication, vol. 28, no. 3, pp. 301-308, 2013. https://doi.org/10.1016/j.image.2012.12.003
  17. F. Chen, H. H. He, H. M. Tai, and H. X. Wang, "Chaos-based self-embedding fragile watermarking with flexible watermark payload," Multimedia Tools and Applications, vol. 72, no. 1, pp. 41-56, 2014. https://doi.org/10.1007/s11042-012-1332-5
  18. D. Singh and S. K. Singh, "Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability," Journal of Visual Communication and Image Representation, vol. 38, pp. 775-789, 2016. https://doi.org/10.1016/j.jvcir.2016.04.023
  19. S. Dadkhah, A. A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, "An effective SVD-based image tampering detection and self-recovery using active watermarking," Signal Processing: Image Communication, vol. 29, no. 10, pp. 1197-1210, 2014. https://doi.org/10.1016/j.image.2014.09.001
  20. X. P. Zhang, S. Z. Wang, Z. X. Qian, and G. R. Feng, "Reference sharing mechanism for watermark selfembedding," IEEE Transactions on Image Processing, vol. 20, no. 2, pp. 485-495, 2011. https://doi.org/10.1109/TIP.2010.2066981
  21. T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008. https://doi.org/10.1016/j.patcog.2008.05.003
  22. S. Som, S. Palit, K. Dey, D. Sarkar, J. Sarkar, and K. Sarkar, "A DWT-based digital watermarking scheme for image tamper detection, localization, and restoration," in Applied Computation and Security Systems. New Delhi, India: Springer, 2015, pp. 17-37.
  23. F. Cao, B. W. An, J. W. Wang, D. P. Ye, and H. L. Wang, "Hierarchical recovery for tampered images based on watermark self-embedding," Displays, vol. 46, pp. 52-60, 2017. https://doi.org/10.1016/j.displa.2017.01.001
  24. C. Qin, P. Ji, X. P. Zhang, J. Dong, and J. W. Wang, "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280-293, 2017. https://doi.org/10.1016/j.sigpro.2017.03.033
  25. Z. X. Qian, G. R. Feng, X. P. Zhang, and S. Z. Wang, "Image self-embedding with high-quality restoration capability," Digital Signal Processing, vol. 21, no. 2, pp. 278-286, 2011. https://doi.org/10.1016/j.dsp.2010.04.006
  26. Y. R. Huo, H. J. He, and F. Chen, "Alterable-capacity fragile watermarking scheme with restoration capability," Optics Communications, vol. 285, no. 7, pp. 1759-1766, 2012. https://doi.org/10.1016/j.optcom.2011.12.044
  27. C. Qin, H. L. Wang, X. P. Zhang, and X. M. Sun, "Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode," Information Sciences, vol. 373, pp. 233-250, 2016. https://doi.org/10.1016/j.ins.2016.09.001
  28. R. Eswaraiah and E. S. Reddy, "A fragile ROI-based medical image watermarking technique with tamper detection and recovery," in Proceedings of the 4th International Conference on Communication Systems and Network Technologies, Bhopal, India, 2014, pp. 896-899.
  29. S. C. Liew, S. W. Liew, and J. M. Zain, "Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication," Journal of Digital Imaging, vol. 26, no. 2, pp. 316-325, 2013. https://doi.org/10.1007/s10278-012-9484-4
  30. C. L. Li, Y. H. Wang, B. Ma, and Z. X. Zhang, "Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme," Computer Standards and Interfaces, vol. 34, no. 4, pp. 367-379, 2012. https://doi.org/10.1016/j.csi.2012.01.003