Adaptive self-recovery for tampered images based on VQ indexing and inpainting

In this paper, we propose a novel self-recovery scheme for tampered images using vector quantization (VQ) indexing and image inpainting. Cover image blocks are classified into complex blocks and smooth blocks according to the distribution characteristics. Due to the good performance of the compressed representation of VQ and the automatic repairing capability of image inpainting, the recovery-bits of each cover block are generated by its VQ index and the inpainting indicator. Recovery-bits and authentication-bits are embedded into the LSB planes of the cover image to produce the watermarked image. On the receiver side, after tampered blocks are all localized, the extracted recovery-bits are used to judge the classification of each tampered block. By analyzing the validity of the VQ indices and the damaged degree of the neighboring regions, the adaptive recovery mechanism can be utilized to restore all the tampered blocks by using VQ index and image inpainting. Experimental results demonstrate the effectiveness of the proposed scheme.

[1]  Min Wu,et al.  Digital image forensics via intrinsic fingerprints , 2008, IEEE Transactions on Information Forensics and Security.

[2]  Alex ChiChung Kot,et al.  Binary Image Authentication With Tampering Localization by Embedding Cryptographic Signature and Block Identifier , 2006, IEEE Signal Processing Letters.

[3]  Jiashu Zhang,et al.  Adjacent-block based statistical detection method for self-embedding watermarking techniques , 2009, Signal Process..

[4]  Raymond H. Chan,et al.  A Primal–Dual Method for Total-Variation-Based Wavelet Domain Inpainting , 2012, IEEE Transactions on Image Processing.

[5]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[6]  Chin-Chen Chang,et al.  A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity , 2008, Pattern Recognit..

[7]  Hany Farid,et al.  Exposing Digital Forgeries From JPEG Ghosts , 2009, IEEE Transactions on Information Forensics and Security.

[8]  F. Chung,et al.  Fragile watermarking scheme for image authentication , 2003 .

[9]  Zhenxing Qian,et al.  Image self-embedding with high-quality restoration capability , 2011, Digit. Signal Process..

[10]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[11]  Zhe-ming Lu,et al.  Semi-fragile image watermarking method based on index constrained vector quantisation , 2003 .

[12]  Chin-Chen Chang,et al.  Dual Digital Watermarking for Internet Media Based on Hybrid Strategies , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[13]  Chin-Chen Chang,et al.  Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..

[14]  Tony F. Chan,et al.  Mathematical Models for Local Nontexture Inpaintings , 2002, SIAM J. Appl. Math..

[15]  Guillermo Sapiro,et al.  Navier-stokes, fluid dynamics, and image and video inpainting , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[16]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[17]  Xinpeng Zhang,et al.  Fragile watermarking scheme using a hierarchical mechanism , 2009, Signal Process..

[18]  Di Wu,et al.  A novel image hash algorithm resistant to print-scan , 2009, Signal Process..

[19]  Xinpeng Zhang,et al.  Fragile Watermarking With Error-Free Restoration Capability , 2008, IEEE Transactions on Multimedia.

[20]  Xinpeng Zhang,et al.  Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.

[21]  Chin-Chen Chang,et al.  An efficient image authentication method based on Hamming code , 2007, Pattern Recognit..

[22]  Zhenxing Qian,et al.  Inpainting Assisted Self Recovery With Decreased Embedding Data , 2010, IEEE Signal Processing Letters.

[23]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[24]  Vishal Monga,et al.  Robust and Secure Image Hashing via Non-Negative Matrix Factorizations , 2007, IEEE Transactions on Information Forensics and Security.

[25]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[26]  Chun-Wei Yang,et al.  Recover the tampered image based on VQ indexing , 2010, Signal Process..

[27]  Shan Suthaharan,et al.  Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..

[28]  Chin-Chen Chang,et al.  Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..

[29]  Robert M. Gray,et al.  An Algorithm for Vector Quantizer Design , 1980, IEEE Trans. Commun..

[30]  Chin-Chen Chang,et al.  Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook , 2007, IEEE Transactions on Image Processing.

[31]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[32]  Jean-Francois Delaigle,et al.  Invisibility and application functionalities in perceptual watermarking an overview , 2002, Proc. IEEE.

[33]  Husrev T. Sencar,et al.  Overview of State-of-the-Art in Digital Image Forensics , 2007 .