Reversible fragile watermarking for locating tampered blocks in JPEG images

This paper proposes a novel fragile watermarking scheme for JPEG image authentication. The watermark is generated by folding the hash results of quantized coefficients, and each block is used to carry two watermark bits using a reversible data-hiding method. Because modification to the cover is small, the visual quality of watermarked image is satisfactory. On the receiver side, one may attempt to extract the watermark and recover the original content. By measuring mismatch between the watermark data extracted from the received image and derived from the recovered content, the blocks containing fake content can be located accurately, while the original information in the other blocks is retrieved without any error as long as the tampered area is not extensive.

[1]  Jean-Francois Delaigle,et al.  Invisibility and application functionalities in perceptual watermarking an overview , 2002, Proc. IEEE.

[2]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[3]  F. Chung,et al.  Fragile watermarking scheme for image authentication , 2003 .

[4]  Adnan M. Alattar,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .

[5]  Hefei Ling,et al.  VLC-counted watermarking for JPEG image complete authentication , 2005, IEEE International Symposium on Communications and Information Technology, 2005. ISCIT 2005..

[6]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[7]  Akio Ogihara,et al.  Reversible Watermarking Method for JPEG Images , 2008, IEICE Trans. Inf. Syst..

[8]  Chang-Tsun Li Digital fragile watermarking scheme for authentication of JPEG images , 2004 .

[9]  Jeho Nam,et al.  A Novel Difference Expansion Transform for Reversible Data Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[10]  Yun Q. Shi,et al.  Reversible Data Hiding for JPEG Images Based on Histogram Pairs , 2007, ICIAR.

[11]  Henk J. A. M. Heijmans,et al.  Reversible data embedding into images using wavelet techniques and sorting , 2005, IEEE Transactions on Image Processing.

[12]  P. Laguna,et al.  Signal Processing , 2002, Yearbook of Medical Informatics.

[13]  Xinpeng Zhang,et al.  Fragile Watermarking With Error-Free Restoration Capability , 2008, IEEE Transactions on Multimedia.

[14]  Xinpeng Zhang,et al.  Fragile watermarking scheme using a hierarchical mechanism , 2009, Signal Process..

[15]  A. Murat Tekalp,et al.  Lossless watermarking for image authentication: a new framework and an implementation , 2006, IEEE Transactions on Image Processing.

[16]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[17]  Wen Gao,et al.  An image fragile watermark scheme based on chaotic image pattern and pixel-pairs , 2007, Appl. Math. Comput..

[18]  Anthony Tung Shuen Ho,et al.  A new semi-fragile image watermarking with robust tampering restoration using irregular sampling , 2007, Signal Process. Image Commun..

[19]  Chin-Chen Chang,et al.  Reversible Steganographic Method with High Payload for JPEG Images , 2008, IEICE Trans. Inf. Syst..

[20]  Ke Ding,et al.  Chaotic watermarking scheme for authentication of JPEG Images , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[21]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[22]  Chien-Chang Chen,et al.  DCT-Based Reversible Image Watermarking Approach , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[23]  Jessica J. Fridrich,et al.  Lossless data embedding for all image formats , 2002, IS&T/SPIE Electronic Imaging.

[24]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[25]  Xinpeng Zhang,et al.  Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.

[26]  Shan Suthaharan,et al.  Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..

[27]  Gerardo Pineda Betancourth,et al.  Fragile Watermarking Scheme for Image Authentication , 2012, 2012 5th International Conference on Human System Interactions.

[28]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.