Image authentication algorithm with recovery capabilities based on neural networks in the DCT domain

In this study, the authors propose an image authentication algorithm in the DCT domain based on neural networks. The watermark is constructed from the image to be watermarked. It consists of the average value of each 8 × 8 block of the image. Each average value of a block is inserted in another supporting block sufficiently distant from the protected block to prevent simultaneous deterioration of the image and the recovery data during local image tampering. Embedding is performed in the middle frequency coefficients of the DCT transform. In addition, a neural network is trained and used later to recover tampered regions of the image. Experimental results shows that the proposed method is robust to JPEG compression and can also not only localise alterations but also recover them.

[1]  Shailendra Singh A Study of Image Authentication Algorithms , 2007 .

[2]  Anthony Tung Shuen Ho,et al.  A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression , 2011, IWDW.

[3]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[4]  J. Humberto Pérez-Cruz,et al.  Tracking Control Based on Recurrent Neural Networks for Nonlinear Systems with Multiple Inputs and U , 2012 .

[5]  Marco Ferretti,et al.  A taxonomy for image authentication techniques and its application to the current state of the art , 2001, Proceedings 11th International Conference on Image Analysis and Processing.

[6]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[7]  Chokri Ben Amar,et al.  Shearlet Network-based Sparse Coding Augmented by Facial Texture Features for Face Recognition , 2013, ICIAP.

[8]  Plamen P. Angelov,et al.  Uniformly Stable Backpropagation Algorithm to Train a Feedforward Neural Network , 2011, IEEE Transactions on Neural Networks.

[9]  Jose de Jesus Rubio,et al.  Characterisation framework for epileptic signals , 2012 .

[10]  Plamen P. Angelov,et al.  Fuzzily Connected Multimodel Systems Evolving Autonomously From Data Streams , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[11]  Asifullah Khan,et al.  Wavelet Based Image Authentication and Recovery , 2007, Journal of Computer Science and Technology.

[12]  Jose de Jesus Rubio,et al.  Modified optimal control with a backpropagation network for robotic arms , 2012 .

[13]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[14]  J. Humberto Pérez-Cruz,et al.  Evolving intelligent system for the modelling of nonlinear systems with dead-zone input , 2014, Appl. Soft Comput..