Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging

Abstract This paper presents a region-based tampering detection and restoring scheme that exploits both lossless (reversible) data hiding and image homogeneity analysis for image authentication and integrity verification. The proposed scheme enables the detection of a tampered region and then recovers it by using the embedded information selected as the recovery feature. Moreover, since reversibility helps in taking the correct decision during image analysis, it is highly desired in quality-sensitive imaging such as medical imaging and satellite imaging, where even minimal distortion introduced by embedding data is unacceptable. To extract the recovery feature, we analyze the image homogeneity using quad-tree decomposition, which adaptively divides a square image into several variable-sized blocks, and choose the average value of each block as the feature. This makes the length of the feature more efficient while ensuring that the visual quality of the restored image is better than that in the case of the conventional fixed-size block-based approach. Through experiments on 8-bit, 12-bit, and 16-bit images, we demonstrate the effectiveness of tampering localization of the proposed method and show that restoration is achieved with high visual quality.

[1]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[2]  U. Rajendra Acharya,et al.  Compact storage of medical images with patient information , 2001, IEEE Transactions on Information Technology in Biomedicine.

[3]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[4]  H. K. Huang,et al.  Authenticity and integrity of digital mammography images , 2001, IEEE Transactions on Medical Imaging.

[5]  A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain , 2006, 2006 IEEE International Conference on Multimedia and Expo.

[6]  Tian-ge Zhuang,et al.  A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data , 2009, Journal of Digital Imaging.

[7]  Mehdi Fallahpour,et al.  Reversible image data hiding based on gradient adjusted prediction , 2008, IEICE Electron. Express.

[8]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[9]  Christophe De Vleeschouwer,et al.  Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..

[10]  Chun-Shien Lu,et al.  Mean-quantization-based fragile watermarking for image authentication , 2001 .

[11]  Min Wu,et al.  Multimedia Data Hiding , 2003, Springer New York.

[12]  Alan C. Bovik,et al.  Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.

[13]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[14]  Ruey-Feng Chang,et al.  Tamper Detection and Restoring System for Medical Images Using Wavelet-based Reversible Data Embedding , 2008, Journal of Digital Imaging.

[15]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[16]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[17]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..