Browse > Article
http://dx.doi.org/10.3837/tiis.2013.11.023

Effective Fragile Watermarking for Image Authentication with High-quality Recovery Capability  

Qin, Chuan (School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology)
Chang, Chin-Chen (Department of Information Engineering and Computer Science, Feng Chia University)
Hsu, Tai-Jung (Department of Computer Science and Information Engineering, National Chung Cheng University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.7, no.11, 2013 , pp. 2941-2956 More about this Journal
Abstract
In this paper, we propose an effective fragile image watermarking scheme for tampering detection and content recovery. Cover image is divided into a series of non-overlapping blocks and a block mapping relationship is constructed by the secret key. Several DCT coefficients with direct current and lower frequencies of the MSBs for each block are used to generate the reference bits, and different coefficients are assigned with different bit numbers for representation according to their importance. To enhance recovery performance, authentication bits are generated by the MSBs and the reference bits, respectively. After LSB substitution hiding, the embedded watermark bits in each block consist of the information of itself and its mapping blocks. On the receiver side, all blocks with tampered MSBs can be detected and recovered using the valid extracted reference bits. Experimental results demonstrate the effectiveness of the proposed scheme.
Keywords
Fragile watermarking; image authentication; tampering detection; content recovery;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. Wu, X. B. Zhou and X. M. Niu, "A novel image hash algorithm resistant to print-scan," Signal Processing, vol. 89, no. 12, pp. 2415-2424, 2009.   DOI   ScienceOn
2 V. Monga and M. K. Mhcak, "Robust and secure image hashing via non-negative matrix factorizations," IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 376-390, 2007.   DOI   ScienceOn
3 H. T. Sencar and N. Memon, "Overview of state-of-the-art in digital image forensics," World Scientific Press, 2007.
4 A. Swaminathan, M. Wu and K. J. R. Liu, "Digital image forensics via intrinsic fingerprints," IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 101-117, 2008.   DOI   ScienceOn
5 H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 154-160, 2009.   DOI
6 P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, no.10, pp. 1593-1601, 2001.   DOI   ScienceOn
7 S. Suthaharan, "Fragile image watermarking using a gradient image for improved localization and security," Pattern Recognition Letters, vol. 25, no. 16, pp. 1893-1903, 2004.   DOI   ScienceOn
8 H. Yang and A. C. Kot, "Binary image authentication with tampering localization by embedding cryptographic signature and block identifier," IEEE Signal Processing Letters, vol. 13, no. 12, pp. 741-744, 2006.   DOI   ScienceOn
9 J. Fridrich and M. Goljan, "Images with self-correcting capabilities," in Proc. of IEEE International Conference on Image Processing, pp. 792-796, 1999.
10 H. Lu, R. Shen and F. L. Chung, "Fragile watermarking scheme for image authentication," Electronics Letters, vol. 39, no. 12, pp. 898-900, 2003.   DOI   ScienceOn
11 X. P. Zhang and S. Z. Wang, "Statistical fragile watermarking capable of locating individual tampered pixels," IEEE Signal Processing Letters, vol. 14, no. 10, pp. 727-730, 2007.   DOI   ScienceOn
12 X. P. Zhang and S. Z. Wang, "Fragile watermarking scheme using a hierarchical mechanism," Signal Processing, vol. 89, no. 4, pp. 675-679, 2009.   DOI   ScienceOn
13 X. P. Zhang and S. Z. Wang, "Fragile watermarking with error-free restoration capability," IEEE Transactions on Multimedia, vol. 10, no. 8, pp. 1490-1499, 2008.   DOI   ScienceOn
14 C. Qin, C. C. Chang and P. Y. Chen, "Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism," Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012.   DOI   ScienceOn
15 H. J. He, J. S. Zhang and F. Chen, "Adjacent-block based statistical detection method for self-embedding watermarking techniques," Signal Processing, vol. 89, no. 8, pp. 1557-1566, 2009.   DOI   ScienceOn
16 Z. X. Qian and G. R. Feng, "Inpainting assisted self recovery with decreased embedding data," IEEE Signal Processing Letters, vol. 17, no. 11, pp. 929-932, 2010.   DOI   ScienceOn
17 X. P. Zhang, S. Z. Wang, Z. X. Qian and G. R. Feng, "Reference sharing mechanism for watermark self-embedding," IEEE Transactions on Image Processing, vol. 20, no. 2, pp. 485-495, 2011.   DOI   ScienceOn
18 Z. X. Qian, G. R. Feng, X. P. Zhang and S. Z. Wang, "Image self-embedding with high-quality restoration capability," Digital Signal Processing, vol. 21, no. 2, pp. 278-286, 2011.   DOI   ScienceOn
19 C. W. Yang and J. J. Shen, "Recover the tampered image based on VQ indexing," Signal Processing, vol. 90, no. 1, pp. 331-343, 2010.   DOI   ScienceOn
20 X. P. Zhang, S. Z. Wang and G. R. Feng, "Fragile watermarking scheme with extensive content restoration capability," in Proc. of the 8th International Workshop on Digital Watermark (IWDW 2009), pp. 268-278, 2009.
21 C. Qin, C. C. Chang and K. N. Chen, "Adaptive self-recovery for tampered images based on VQ indexing and inpainting," Signal Processing, vol. 93, no. 4, pp. 933-946, 2013.   DOI   ScienceOn
22 F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, 1999.   DOI   ScienceOn
23 C. S. Chan and C. C. Chang, "An efficient image authentication method based on Hamming code," Pattern Recognition, vol. 40, no. 2, pp. 681-690, 2007.   DOI   ScienceOn
24 C. C. Wu, S. J. Kao and M. S. Hwang, "A high quality image sharing with steganography and adaptive authentication scheme," Journal of Systems and Software, vol. 84, no. 12, pp. 2196-2207, 2011.   DOI   ScienceOn
25 P. D. Sheba Kezia Malarchelvi, "A semi-fragile image content authentication technique based on secure hash in frequency domain," International Journal of Network Security, vol. 15, no. 5, pp. 365-372, 2013.
26 P. Y. Lin, J. S. Lee and C. C. Chang, "Dual digital watermarking for internet media based on hybrid strategies," IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 8, pp. 1169-1171, 2009.   DOI   ScienceOn
27 S. S. Sujatha and M. M. Sathik, "A novel DWT based blind watermarking for image authentication," International Journal of Network Security, vol. 14, no. 4, pp. 223-228, 2012.
28 A. Swaminathan, Y. N. Mao and M. Wu, "Robust and secure image hashing," IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 215-230, 2006.   DOI   ScienceOn