Semi-fragile self-recoverable watermarking scheme for face image protection

PCA coefficients are used to generate information watermarks, and the authentication watermarks are generated using SVD coefficients.The embedding position is generated by a chaotic map, and it improves the security of the proposed method.Watermarks are embedded into the mid-frequency bands by using our proposed SDPQ method. Display Omitted Digital watermarking based biometric images protecting has been an active research focus. In this paper, we propose a face image protection scheme based on semi-fragile self-recoverable watermarking. Authentication watermark is generated from the singular value decomposition (SVD) coefficients for each image block, and information watermark is generated from the principal component analysis (PCA) coefficients. Both of them are embedded into wavelet medium frequency coefficients by using the proposed group-based wavelet quantization method. On the authentication side, after identifying the tampered regions, the proposed method can recover the tampered face images by using the hidden information watermark. Experimental results demonstrate that the proposed watermark scheme has high localization accuracy and robustness comparing with the existing techniques, and the recovered PCA coefficients can be used to reconstruct the Eigen-face image or be directly used for recognition system.

[1]  Aamir Saeed Malik,et al.  Dual-purpose semi-fragile watermark: Authentication and recovery of digital images , 2013, Comput. Electr. Eng..

[2]  Priti P. Rege,et al.  A multiple reversible watermarking technique for fingerprint authentication , 2015, Multimedia Systems.

[3]  Heng-Ming Tai,et al.  Block-Chain Based Fragile Watermarking Scheme with Superior Localization , 2008, Information Hiding.

[4]  Min-Jen Tsai,et al.  Authentication and recovery for wavelet-based semifragile watermarking , 2008 .

[5]  Amit Phadikar,et al.  Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images , 2012, J. Vis. Commun. Image Represent..

[6]  Fan Chen,et al.  A Restorable Semi-fragile Watermarking Combined DCT with Interpolation , 2013, IWDW.

[7]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[8]  Lei Tian,et al.  A new watermarking method based on chaotic maps , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[9]  Asifullah Khan,et al.  Digital image authentication and recovery: Employing integer transform based information embedding and extraction , 2010, Inf. Sci..

[10]  Muzhir Shaban Al-Ani Efficient Watermarking based an Robust Biometric Features , 2013 .

[11]  Bin Ma,et al.  A Secure Semi-fragile Self-recoverable Watermarking Algorithm Using Group-Based Wavelet Quantization , 2012, PCM.

[12]  Asifullah Khan,et al.  Authentication and recovery of images using multiple watermarks , 2010, Comput. Electr. Eng..

[13]  Bin Ma,et al.  Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme , 2012, Comput. Stand. Interfaces.

[14]  Liu Dong-yan Research of Recoverable Semi-fragile Watermarking for Image Content , 2010 .

[15]  Shih-Fu Chang,et al.  SARI: self-authentication-and-recovery image watermarking system , 2001, MULTIMEDIA '01.

[16]  Tung-Shou Chen,et al.  Image tamper detection and recovery system based on discrete wavelet transformation , 2001, 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233).

[17]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[18]  Pim Tuyls,et al.  Privacy protecting biometric authentication systems: An overview , 2004, 2004 12th European Signal Processing Conference.

[19]  Vaibhav B. Joshi,et al.  Multilevel Semi-fragile Watermarking Technique for Improving Biometric Fingerprint System Security , 2013 .

[20]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[21]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[22]  Yuhang Li,et al.  Semi-fragile watermarking for image tamper localization and self-recovery , 2014, Proceedings 2014 IEEE International Conference on Security, Pattern Analysis, and Cybernetics (SPAC).

[23]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[24]  Swanirbhar Majumder,et al.  Singular value decomposition and wavelet-based iris biometric watermarking , 2013, IET Biom..