Watermarking-based tamper detection and recovery algorithms for official documents

This paper proposes two watermarking-based algorithms for temper detection and recovery of the tampered regions, which can be applied to official documents, such as digitized passports and governmental registrations. In both algorithms, a halftone version of the original grayscale image is used as an approximated version of the host image (image digest), which is then embedded as a watermark sequence into the frequency domains of the host image. In the first algorithm, the Integer Wavelet Transform (IWT) is used for watermark embedding (WIA-IWT); while in the second one, the Discrete Cosine Transform (DCT) domain is used for this purpose (WIA-DCT). The experimental results demonstrate the robustness of both algorithms against content preserved modifications, such as JPEG compression, as well as recovery capability. Moreover, we employ a Multilayer Perceptron neural network (MLP) in inverse halftoning process to improve the recovered image quality, where the gray-scale of the modified area is estimated by the MLP using the extracted halftone image. The experimental results demonstrate the effectiveness of the proposed scheme.

[1]  Wim Sweldens,et al.  The lifting scheme: a construction of second generation wavelets , 1998 .

[2]  M. Mese,et al.  Recent Advances in Digital Halftoning and Inverse Halftoning Methods , 2002 .

[3]  Asifullah Khan,et al.  Authentication and recovery of images using multiple watermarks , 2010, Comput. Electr. Eng..

[4]  Ioannis Pitas,et al.  Embedding robust watermarks by chaotic mixing , 1997, Proceedings of 13th International Conference on Digital Signal Processing.

[5]  N. Ahmed,et al.  Discrete Cosine Transform , 1996 .

[6]  Franco Bartolini,et al.  Self Recovery Authentication Of Images In The Dwt Domain , 2005, Int. J. Image Graph..

[7]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Transactions on Multimedia.

[8]  Helen Treharne,et al.  A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[9]  Xiang Zhou,et al.  A semifragile watermark scheme for image authentication , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..

[10]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[11]  Kôki Abe,et al.  A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[12]  Ke Ding,et al.  Wavelet-Based Semi-Fragile Watermarking with Tamper Detection , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..