Skip to content
BY-NC-ND 3.0 license Open Access Published by De Gruyter March 15, 2013

A block-based watermarking scheme for image tamper detection and self-recovery

  • Y. Chang EMAIL logo and W. Tai
From the journal Opto-Electronics Review

Abstract

In this paper, we present an effective block-based digital fragile watermarking scheme for image tamper detection and recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. It adopts parity check and the intensity-relation check to thwart various malicious attacks. In the tamper detection process, instead of independently testing the embedded authentication data of each block, we take the block-neighbourhood into account and utilize a hierarchical structure to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively resist collage attack, vector quantization (VQ) attack and constant-average attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully self-recovered with acceptable visual quality.

[1] J. Dittmann, A. Steinmetz, and R. Steinmetz, “Content-based digital signature for motion pictures authentication and content-fragile watermarking”, IEEE Int. Conf. on Multimedia Computing and Systems, pp. 209–213, Florence, 1999. http://dx.doi.org/10.1109/MMCS.1999.77827410.1109/MMCS.1999.778274Search in Google Scholar

[2] G.I. Friedman, “The trustworthy digital camera: restoring credibility to the photographic image”, Proc. IEEE Int. Conf. on Image Process., pp. 409–413, Chicago, 1998. Search in Google Scholar

[3] C.Y. Lin and S.F. Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation”, IEEE T. Circ. Syst. Vid. 11, 153–168 (2001). http://dx.doi.org/10.1109/76.90598210.1109/76.905982Search in Google Scholar

[4] C.Y. Lin and S.F. Chang, “A robust image authentication method surviving JPEG lossy compression”, SPIE 3312, 296–307 (1998). 10.1117/12.298462Search in Google Scholar

[5] C.S. Lu, H.Y. M. Liao, and C.J. Sze, “Structural digital signature for image authentication: an incidental distortion resistant scheme”, Proc. 8th Multimedia Security Workshop ACM Int. Conf. on Multimedia, pp. 115–118, Los Angeles, 2000. Search in Google Scholar

[6] P. Bao and X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition”, IEEE T. Circ. Syst. Vid. 15, 96–102 (2005). http://dx.doi.org/10.1109/TCSVT.2004.83674510.1109/TCSVT.2004.836745Search in Google Scholar

[7] M.U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, “Hierarchical watermarking for secure image authentication with localization”, IEEE T. Image Process. 11, 585–594 (2002). http://dx.doi.org/10.1109/TIP.2002.101499010.1109/TIP.2002.1014990Search in Google Scholar PubMed

[8] M.U. Celik, G. Sharma, and A.M. Tekalp, “Lossless watermarking for image authentication: a new framework and an implementation”, IEEE T. Image Process. 15, 1042–1049 (2006). http://dx.doi.org/10.1109/TIP.2005.86305310.1109/TIP.2005.863053Search in Google Scholar PubMed

[9] C.C. Chang, Y.S. Hu, and T.C. Lu, “A watermarking-based image ownership and tampering authentication scheme”, Pattern Recogn. Lett. 27, 439–446 (2006). http://dx.doi.org/10.1016/j.patrec.2005.09.00610.1016/j.patrec.2005.09.006Search in Google Scholar

[10] J. Fridrich, “Image watermarking for tamper detection”, Proc. IEEE Int. Conf. on Image Process. 2, pp. 404–408, Chicago, 1998. Search in Google Scholar

[11] J. Fridrich, M. Goljan, and A.C. Baldoza, “New fragile authentication watermark for images”, Proc. IEEE Int. Conf. on Image Process. 1, pp. 10–13, Vancouver, 2000. Search in Google Scholar

[12] C.T. Hsu and J.L. Wu, “Hidden digital watermarks in images”, IEEE T. Image Process. 8, 58–68 (1999). http://dx.doi.org/10.1109/83.73668610.1109/83.736686Search in Google Scholar PubMed

[13] D. Kundur and D. Hatzinakos, “Toward a telltale watermarking technique for tamper-proofing”, Proc. IEEE Int. Conf. on Image Process. 2, 409–413 (1998). Search in Google Scholar

[14] C.S. Lu and H.Y.M. Liao, “Multipurpose watermarking for image authentication and protection”, IEEE T. Image Process. 10, 435–439 (2001). http://dx.doi.org/10.1109/83.94186110.1109/83.941861Search in Google Scholar PubMed

[15] Z.M. Lu, D.G. Xu, and S.H. Sun, “Multipurpose image watermarking algorithm based on multistage vector quantization”, IEEE T. Image Process. 14, 822–831 (2005). http://dx.doi.org/10.1109/TIP.2005.84732410.1109/TIP.2005.847324Search in Google Scholar PubMed

[16] K. Maeno, Q. Sun, and S.F. Chang, “New semi-fragile images authentication watermarking techniques using random bias and non-uniform quantization”, IEEE T. Multimedia 8, 32–45 (2006). Search in Google Scholar

[17] M.P. Queluz, “Content-based integrity protection of digital image”, Proc. SPIE 3657, 85–93 (1999). Search in Google Scholar

[18] M. Schneider and S.F. Chang, “A robust content based digital signature for image authentication”, Proc. IEEE Int. Conf. on Image Process. 3, pp. 227–230, Lausanne, 1996. http://dx.doi.org/10.1109/ICIP.1996.56042510.1109/ICIP.1996.560425Search in Google Scholar

[19] S. Shan, “Fragile image watermarking using a gradient image for improved localization and security”, Pattern Recogn. Lett. 25, 1893–1903 (2004). http://dx.doi.org/10.1016/j.patrec.2004.08.01710.1016/j.patrec.2004.08.017Search in Google Scholar

[20] P.W. Wong, “A public key watermark for image verification and authentication”, Proc. IEEE Int. Conf. on Image Process. 1, pp. 455–459, Chicago, 1998. Search in Google Scholar

[21] P.W. Wong and N. Memon, “Secret an public key image watermarking schemes for image authentication and ownership verification”, IEEE T. Image Process. 10, 1593–1601 (2001). http://dx.doi.org/10.1109/83.95154310.1109/83.951543Search in Google Scholar PubMed

[22] Y. Wu and R.H. Deng, “Security of an ill-posed operator for image authentication”, IEEE T. Circ. Syst. Vid. 15, 161–163 (2005). http://dx.doi.org/10.1109/TCSVT.2005.84830410.1109/TCSVT.2005.848304Search in Google Scholar

[23] M.M. Yeung and F. Mintizer, “An invisible watermarking technique for image verification”, Proc. IEEE Int. Conf. on Image Process. 1, pp. 680–683, Santa Barbara, 1997. http://dx.doi.org/10.1109/ICIP.1997.63858710.1109/ICIP.1997.638587Search in Google Scholar

[24] P.L. Lin, C.K. Hsieh, and P.W. Huang, “A hierarchical digital watermarking method for image tamper detection and recovery”, Pattern Recogn. 38, 2519–2529 (2005). http://dx.doi.org/10.1016/j.patcog.2005.02.00710.1016/j.patcog.2005.02.007Search in Google Scholar

[25] M. Holliman and N. Memon, “Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes”, IEEE T. Image Process. 9, 432–441 (2000). http://dx.doi.org/10.1109/83.82678010.1109/83.826780Search in Google Scholar PubMed

[26] C.C. Chang, Y.H. Fan, and W.L. Tai, “Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery”, Pattern Recogn. 41, 654–661 (2008). http://dx.doi.org/10.1016/j.patcog.2007.06.00310.1016/j.patcog.2007.06.003Search in Google Scholar

[27] M.S. Wang and W.C. Chen, “A majority-voting based watermarking scheme for colour image tamper detection and recovery”, Comput. Stand. Inter. 29, 561–570 (2007). http://dx.doi.org/10.1016/j.csi.2006.11.00910.1016/j.csi.2006.11.009Search in Google Scholar

[28] T.Y. Lee and S.D. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recogn. 41, 3497–3506 (2008). http://dx.doi.org/10.1016/j.patcog.2008.05.00310.1016/j.patcog.2008.05.003Search in Google Scholar

[29] C.W. Yang and J.J. Shen, “Recover the tampered image based on VQ indexing”, Signal Process. 90, 331–343 (2010). http://dx.doi.org/10.1016/j.sigpro.2009.07.00710.1016/j.sigpro.2009.07.007Search in Google Scholar

Published Online: 2013-3-15
Published in Print: 2013-6-1

© 2013 SEP, Warsaw

This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.

Downloaded on 4.5.2024 from https://www.degruyter.com/document/doi/10.2478/s11772-013-0088-4/html
Scroll to top button