Skip to main content
Erschienen in: International Journal of Machine Learning and Cybernetics 6/2016

01.12.2016 | Original Article

SVD based fragile watermarking scheme for tamper localization and self-recovery

verfasst von: Irshad Ahmad Ansari, Millie Pant, Chang Wook Ahn

Erschienen in: International Journal of Machine Learning and Cybernetics | Ausgabe 6/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper proposes a novel fragile watermarking approach for digital image tamper localization (TL) along with the self-recovery (SR) capability. The host image is first divided into blocks of size 4 × 4 and then, singular value decomposition is performed on each block. The trace of singular matrix is used to compute the TL bits for each block. These 4 × 4 blocks are further divided into blocks of size 2 × 2 to compute the SR information. This SR information is also used for 2nd level of tamper detection in order to enhance the resolution of TL. Proposed scheme implements a self-embedding of TL bits and mapped embedding of SR bits and for that, block mapping is performed. The encrypted combination of both the codes (TL of parent block + SR of mapped block) is inserted in the 1st and 2nd least significant bits of the parent block. Encryption of watermark bits (unique for each watermarked image) helps it to sustain the block based attacks (vector quantization, collage and four scanning attack). Whereas; two level of authentication helps it to sustain content only and constant average attack. The scheme provides an average detection rate of more than 99.5 % and average recovery of 28 dB for a 50 % tampering. The proposed scheme shows a superior performance, when it is compared with the earlier proposed schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Matsuo T, Kurosawa K (2004) On parallel hash functions based on block-ciphers. IEICE Trans Fundam Electron Commun Comput Sci 87(1):67–74 Matsuo T, Kurosawa K (2004) On parallel hash functions based on block-ciphers. IEICE Trans Fundam Electron Commun Comput Sci 87(1):67–74
3.
Zurück zum Zitat Yeung MM, Mintzer F (1997) An invisible watermarking technique for image verification. Proc IEEE Int Conf Image Process 2:680–683CrossRef Yeung MM, Mintzer F (1997) An invisible watermarking technique for image verification. Proc IEEE Int Conf Image Process 2:680–683CrossRef
4.
Zurück zum Zitat Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601CrossRefMATH Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601CrossRefMATH
5.
Zurück zum Zitat Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25(16):1893–1903CrossRef Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25(16):1893–1903CrossRef
6.
Zurück zum Zitat Chun-Shien Lu and H-YM Liao (2003) Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans Multimed 5(2):161–173CrossRef Chun-Shien Lu and H-YM Liao (2003) Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans Multimed 5(2):161–173CrossRef
7.
Zurück zum Zitat Walton S (1995) Information authentication for a slippery new age. Dr Dobbs J 20:18–26 Walton S (1995) Information authentication for a slippery new age. Dr Dobbs J 20:18–26
8.
Zurück zum Zitat Liu S-H, Yao H-X, Gao W, Liu Y-L (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185(2):869–882MATH Liu S-H, Yao H-X, Gao W, Liu Y-L (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185(2):869–882MATH
9.
Zurück zum Zitat Memon N, Shende S, Wong PW (1999) On the security of the Yeung-Mintzer authentication watermark. In: Is and TS Pics conference. Society for imaging science & technology, pp 301–306 Memon N, Shende S, Wong PW (1999) On the security of the Yeung-Mintzer authentication watermark. In: Is and TS Pics conference. Society for imaging science & technology, pp 301–306
10.
Zurück zum Zitat Li C-T, Yuan Y (2006) Digital watermarking scheme exploiting nondeterministic dependence for image authentication. Opt Eng 45(12):127001CrossRef Li C-T, Yuan Y (2006) Digital watermarking scheme exploiting nondeterministic dependence for image authentication. Opt Eng 45(12):127001CrossRef
11.
Zurück zum Zitat Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446CrossRef Chang CC, Hu YS, Lu TC (2006) A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn Lett 27(5):439–446CrossRef
12.
Zurück zum Zitat Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36:1300–1307CrossRef Chen WC, Wang MS (2009) A fuzzy c-means clustering-based fragile watermarking scheme for image authentication. Expert Syst Appl 36:1300–1307CrossRef
13.
Zurück zum Zitat Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441CrossRef Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441CrossRef
14.
Zurück zum Zitat Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int J Electron Commun 65:840–847CrossRef Rawat S, Raman B (2011) A chaotic system based fragile watermarking scheme for image tamper detection. AEU Int J Electron Commun 65:840–847CrossRef
15.
Zurück zum Zitat Zhang X, Wang S (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14:727–730CrossRef Zhang X, Wang S (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14:727–730CrossRef
16.
Zurück zum Zitat Rosales-Roldan L, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H, Kurkoski B (2013) Watermarking based image authentication with recovery capability using halftoning technique. Signal Process Image Commun 28(1):69–83CrossRef Rosales-Roldan L, Cedillo-Hernandez M, Nakano-Miyatake M, Perez-Meana H, Kurkoski B (2013) Watermarking based image authentication with recovery capability using halftoning technique. Signal Process Image Commun 28(1):69–83CrossRef
17.
Zurück zum Zitat Wang L-J, Syue M-Y (2013) A wavelet based multipurpose watermarking for image authentication and recovery. Int J Commun 2(4) Wang L-J, Syue M-Y (2013) A wavelet based multipurpose watermarking for image authentication and recovery. Int J Commun 2(4)
18.
Zurück zum Zitat Qian Z, Zhao L (2012) A flexible scheme of self-recovery for digital image protection. Int J Comput Sci 9:6 Qian Z, Zhao L (2012) A flexible scheme of self-recovery for digital image protection. Int J Comput Sci 9:6
19.
Zurück zum Zitat Wang M-S, Chen W-C (2007) A majority-voting based watermarking scheme for color image tamper detection and recovery. Comput Stand Interfaces 29(5):561–570CrossRef Wang M-S, Chen W-C (2007) A majority-voting based watermarking scheme for color image tamper detection and recovery. Comput Stand Interfaces 29(5):561–570CrossRef
20.
Zurück zum Zitat Yuan H, Zhang X-P (2006) Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans Image Process 15(10):3189–3200CrossRef Yuan H, Zhang X-P (2006) Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans Image Process 15(10):3189–3200CrossRef
21.
Zurück zum Zitat Lin PL, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529CrossRef Lin PL, Hsieh C-K, Huang P-W (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 38(12):2519–2529CrossRef
22.
Zurück zum Zitat Wu H-C, Chang C-C (2002) Detection and restoration of tampered JPEG compressed images. J Syst Softw 64(2):151–161CrossRef Wu H-C, Chang C-C (2002) Detection and restoration of tampered JPEG compressed images. J Syst Softw 64(2):151–161CrossRef
23.
Zurück zum Zitat Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506CrossRefMATH Lee T-Y, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41(11):3497–3506CrossRefMATH
24.
Zurück zum Zitat Huang S-C, Jiang C-F (2012) A color image authentication and recovery method using block truncation code embedding [J]. J Mar Sci Technol 20(1):49–55 Huang S-C, Jiang C-F (2012) A color image authentication and recovery method using block truncation code embedding [J]. J Mar Sci Technol 20(1):49–55
25.
Zurück zum Zitat Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. In: IEEE international symposium on intelligent signal processing and communication systems (ISPACS2012), pp 430–435 Patra B, Patra JC (2012) Crt-based fragile self-recovery watermarking scheme for image authentication and recovery. In: IEEE international symposium on intelligent signal processing and communication systems (ISPACS2012), pp 430–435
26.
Zurück zum Zitat Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728–739CrossRefMATH Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Process 91(4):728–739CrossRefMATH
27.
Zurück zum Zitat Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308CrossRef Tong X, Liu Y, Zhang M, Chen Y (2013) A novel chaos based fragile watermarking for image tampering detection and self-recovery. Signal Process Image Commun 28(3):301–308CrossRef
28.
Zurück zum Zitat Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block- wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441CrossRef Holliman M, Memon N (2000) Counterfeiting attacks on oblivious block- wise independent invisible watermarking schemes. IEEE Trans Image Process 9(3):432–441CrossRef
29.
Zurück zum Zitat Chang C-C, Fan Y-H, Tai W-L (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654–661CrossRefMATH Chang C-C, Fan Y-H, Tai W-L (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn 41(2):654–661CrossRefMATH
30.
Zurück zum Zitat Ansari IA, Pant M, Neri F (2014) Analysis of gray scale watermark in RGB host using SVD and PSO. In: IEEE symposium on computational intelligence for multimedia, signal and vision processing (CIMSIVP), pp 1–7 Ansari IA, Pant M, Neri F (2014) Analysis of gray scale watermark in RGB host using SVD and PSO. In: IEEE symposium on computational intelligence for multimedia, signal and vision processing (CIMSIVP), pp 1–7
31.
Zurück zum Zitat Ansari IA, Pant M (2015) SVD watermarking: particle swarm optimization of scaling factors to increase the quality of watermark. In: Springer India proceedings of fourth international conference on soft computing for problem solving, pp 205–214 Ansari IA, Pant M (2015) SVD watermarking: particle swarm optimization of scaling factors to increase the quality of watermark. In: Springer India proceedings of fourth international conference on soft computing for problem solving, pp 205–214
32.
Zurück zum Zitat Agoyi M, Çelebi E, Anbarjafari G (2014) A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition. SIViP 9(3):735–745CrossRef Agoyi M, Çelebi E, Anbarjafari G (2014) A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition. SIViP 9(3):735–745CrossRef
33.
Zurück zum Zitat Sun R, Sun H, Yao T (2002) A SVD-and quantization based semi-fragile watermarking technique for image authentication. In: IEEE 6th international conference on signal processing, vol 2. pp 1592–1595 Sun R, Sun H, Yao T (2002) A SVD-and quantization based semi-fragile watermarking technique for image authentication. In: IEEE 6th international conference on signal processing, vol 2. pp 1592–1595
Metadaten
Titel
SVD based fragile watermarking scheme for tamper localization and self-recovery
verfasst von
Irshad Ahmad Ansari
Millie Pant
Chang Wook Ahn
Publikationsdatum
01.12.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Machine Learning and Cybernetics / Ausgabe 6/2016
Print ISSN: 1868-8071
Elektronische ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-015-0455-1

Weitere Artikel der Ausgabe 6/2016

International Journal of Machine Learning and Cybernetics 6/2016 Zur Ausgabe