A self-recovery fragile watermarking scheme for image authentication with superior localization

To address the problems of the inferior localization and high probability of false rejection in existing self-recovery fragile watermarking algorithms, this paper proposes a new self-recovery fragile watermarking scheme with superior localization, and further discusses the probability of false rejection (PFR) and the probability of false acceptance (PFA) of the proposed scheme. Moreover, four measurements are defined to evaluate the quality of a recovered image. In the proposed algorithm, the original image is divided into 2×2 blocks to improve localization precision and decrease PFR under occurrence of random tampering. The PFR under occurrence of region tampering can be effectively decreased by randomly embedding the water-mark of each block in conjunction with a novel method of tamper detection. Compared with the current self-recovery fragile watermarking algorithms, the proposed scheme not only resolves the tamper detection problem of self-embedding water-marking, but also improves the robustness against the random tampering of self-embedding watermarking. In addition, the subjective measurements are provided to evaluate the performance of the self-recovery watermarking schemes for image authentication.

[1]  Heng-Ming Tai,et al.  A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication , 2006, IWDW.

[2]  Zhang Gong-du A New Fragile Watermark with Self-correcting , 2004 .

[3]  Marshall McLuhan The Rise and Fall of Nature , 1977 .

[4]  Wo Yan A New Feature-Based Image Content Authentication Algorithm , 2005 .

[5]  Shan Suthaharan,et al.  Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..

[6]  Hongxia Wang,et al.  Synchronous Counterfeiting Attacks on self-embedding Watermarking Schemes , 2006 .

[7]  Zhang Jia-shu,et al.  Chaos-based scramble self-embedding watermarking algorithm , 2006 .

[8]  Tian Lei,et al.  A Fragile Watermarking Scheme with Discrimination of Tampers on Image or Watermark , 2005 .

[9]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[10]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[11]  YangCheng,et al.  Tamper detection and self recovery of images using self-embedding , 2005 .

[12]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[13]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[14]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[15]  Po-Whei Huang,et al.  A fragile watermarking scheme for image authentication with localization and recovery , 2004, IEEE Sixth International Symposium on Multimedia Software Engineering.

[16]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[17]  Wu Jin Image Authentication Based on Digital Watermarking , 2004 .

[18]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .