Towards Practical Self-Embedding for JPEG-Compressed Digital Images

This paper deals with the design of a practical self-recovery mechanism for lossy compressed JPEG images. We extend a recently proposed model of the content reconstruction problem based on digital fountain codes to take into account the impact of emerging watermark extraction and block classification errors. In contrast to existing methods, our scheme guarantees a high and stable level of reconstruction quality. Instead of introducing reconstruction artifacts, emerging watermark extraction errors penalize the achievable tampering rates. We introduce new mechanisms that allow for handling high-resolution and color images efficiently. In order to analyze the behavior of our scheme, we derive an improved model to calculate the reconstruction success probability. We introduce a new hybrid mechanism for spreading the reference information over the entire image, which allows to find a good balance between the achievable tampering rates and the computational complexity. Such an approach reduced the watermark embedding time from the order of several minutes to the order of single seconds, even on mobile devices.

[1]  Anthony Tung Shuen Ho,et al.  A new semi-fragile image watermarking with robust tampering restoration using irregular sampling , 2007, Signal Process. Image Commun..

[2]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[3]  J. Fridrich,et al.  Secure Digital Camera , 2004 .

[4]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[5]  Jaejin Lee,et al.  Authentication and correction of digital watermarking images , 1999 .

[6]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[7]  E. B. Wilson Probable Inference, the Law of Succession, and Statistical Inference , 1927 .

[8]  Shih-Fu Chang,et al.  SARI: self-authentication-and-recovery image watermarking system , 2001, MULTIMEDIA '01.

[9]  Mariko Nakano-Miyatake,et al.  Halftoning-based self-embedding watermarking for image authentication and recovery , 2010, 2010 53rd IEEE International Midwest Symposium on Circuits and Systems.

[10]  Pawel Korus,et al.  High-quality self-embedding for JPEG-compressed digital images , 2013, 21st European Signal Processing Conference (EUSIPCO 2013).

[11]  Anthony Tung Shuen Ho,et al.  A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression , 2011, IWDW.

[12]  Christine Guillemot,et al.  Image Inpainting : Overview and Recent Advances , 2014, IEEE Signal Processing Magazine.

[13]  Pawel Korus,et al.  Efficient Method for Content Reconstruction With Self-Embedding , 2013, IEEE Transactions on Image Processing.

[14]  Joong Bum Rhim,et al.  Fountain Codes , 2010 .

[15]  Guillermo Sapiro,et al.  Navier-stokes, fluid dynamics, and image and video inpainting , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[16]  Zhenxing Qian,et al.  Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.

[17]  Shuhong Gao,et al.  Random Krylov Spaces over Finite Fields , 2003, SIAM J. Discret. Math..

[18]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[19]  Kevin Curran,et al.  A secure and improved self-embedding algorithm to combat digital document forgery , 2009, Signal Process..