A majority-voting based watermarking scheme for color image tamper detection and recovery

This paper presents a novel color image watermarking scheme for both tamper detection and tampered image recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. In the tamper detection process, instead of independently examining each embedded authentication data, we take all the authentication data embedded in an image into account and utilize a majority-voting technique to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively thwart collage attack and vector quantization (VQ) attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully recovered with acceptable visual quality.

[1]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[2]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[3]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[4]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[5]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[6]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[7]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[8]  Bernd Girod,et al.  Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[9]  Edward J. Delp,et al.  Detection of image alterations using semifragile watermarks , 2000, Electronic Imaging.

[10]  Edward J. Delp,et al.  A Review of Fragile Image Watermarks , 2007 .

[11]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[12]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[13]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[14]  Shan Suthaharan,et al.  Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..

[15]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[16]  Minerva M. Yeung,et al.  Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.

[17]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[18]  H. Y. Kim,et al.  Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[19]  Nasir D. Memon,et al.  Further attacks on Yeung-Mintzer fragile watermarking scheme , 2000, Electronic Imaging.

[20]  Chin-Chen Chang,et al.  Detection and restoration of tampered JPEG compressed images , 2002, J. Syst. Softw..