Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability

DCT based effective self-recoverable fragile watermarking scheme is presented.This scheme has extreme localization and restoration capability.The blocking artifacts negligible because of using the small blocks of size 2×2.Two levels hierarchical tampered detection mechanisms are used for tampered block detection. This paper presents a Discrete Cosine Transformation (DCT) based effective self-recoverable fragile watermarking scheme. For each 2 × 2 non-overlapping block, two authentication bits, and ten recovery bits are generated from the five most significant bits (MSBs) of pixels. Authentication bits are embedded in the three least significant bits (LSBs) of the block itself while recovery bits are embedded in the three LSBs of the corresponding mapped block. The proposed watermarking scheme is also effective because the authentication of each block is based on two levels hierarchical tampered detection mechanisms. So the detection of tampered block can be ensured with high probability. The experimental results demonstrate that the proposed scheme not only outperforms high-quality restoration effectively, but also removes the blocking artifacts and improves the accuracy of tamper localization due to the use of very small size blocks, smoothing function and two levels tampering detection mechanisms.

[1]  Zhihua Xia,et al.  Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.

[2]  Nanning Zheng,et al.  An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection , 2011, Signal Process. Image Commun..

[3]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[4]  Zhenxing Qian,et al.  Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.

[5]  Chin-Chen Chang,et al.  Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..

[6]  Naixue Xiong,et al.  Steganalysis of LSB matching using differences between nonadjacent pixels , 2016, Multimedia Tools and Applications.

[7]  Zhen Han,et al.  A fragile watermarking scheme with pixel-wise alteration localisation , 2008, 2008 9th International Conference on Signal Processing.

[8]  Asoke K. Nandi,et al.  Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities , 2011, Signal Process..

[9]  Bin Ma,et al.  A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure , 2011, Comput. Electr. Eng..

[10]  Zhongmeng Zhao,et al.  Self-embedding fragile watermarking based on DCT and fast fractal coding , 2014, Multimedia Tools and Applications.

[11]  Fei Peng,et al.  A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation , 2010, Comput. Aided Des..

[12]  Aboul Ella Hassanien,et al.  An effective SVD-based image tampering detection and self-recovery using active watermarking , 2014, Signal Process. Image Commun..

[13]  Radu Ovidiu Preda,et al.  Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain , 2013 .

[14]  Zhenxing Qian,et al.  Image self-embedding with high-quality restoration capability , 2011, Digit. Signal Process..

[15]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[16]  Anthony Tung Shuen Ho,et al.  A new semi-fragile image watermarking with robust tampering restoration using irregular sampling , 2007, Signal Process. Image Commun..

[17]  Xinpeng Zhang,et al.  Fragile Watermarking Scheme with Extensive Content Restoration Capability , 2009, IWDW.

[18]  Pawel Korus,et al.  Adaptive Self-Embedding Scheme With Controlled Reconstruction Performance , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Yongdong Zhang,et al.  Parallel deblocking filter for HEVC on many-core processor , 2014 .

[20]  Pawel Korus,et al.  Efficient Method for Content Reconstruction With Self-Embedding , 2013, IEEE Transactions on Image Processing.

[21]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[22]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[23]  Yongdong Zhang,et al.  A Highly Parallel Framework for HEVC Coding Unit Partitioning Tree Decision on Many-core Processors , 2014, IEEE Signal Processing Letters.

[24]  Sud Sudirman,et al.  A robust region-adaptive dual image watermarking technique , 2012, J. Vis. Commun. Image Represent..

[25]  Suneeta Agarwal,et al.  Quantization-Based Fragile Watermarking using Block-Wise Authentication and Pixel-Wise Recovery Scheme for Tampered Image , 2013, Int. J. Image Graph..

[26]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[27]  Xing Xin,et al.  A quantization-based semi-fragile watermarking scheme for image content authentication , 2011, J. Vis. Commun. Image Represent..

[28]  Suneeta Agarwal,et al.  An effective pixel-wise fragile watermarking scheme based on ARA bits , 2011, ICCCS '11.

[29]  Gaurav Bhatnagar,et al.  A new aspect in robust digital watermarking , 2011, Multimedia Tools and Applications.

[30]  Shivendra Shivani,et al.  Self-embedding Pixel Wise Fragile Watermarking Scheme for Image Authentication , 2013 .

[31]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[32]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[33]  Zhenxing Qian,et al.  Self-embedding watermark with flexible restoration quality , 2011, Multimedia Tools and Applications.

[34]  Suneeta Agarwal,et al.  DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme , 2013, IbPRIA.

[35]  Durgesh Singh,et al.  DCT based efficient fragile watermarking scheme for image authentication and restoration , 2015, Multimedia Tools and Applications.

[36]  Xinpeng Zhang,et al.  Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels , 2007, IEEE Signal Processing Letters.

[37]  Yongdong Zhang,et al.  Efficient Parallel Framework for HEVC Motion Estimation on Many-Core Processors , 2014, IEEE Transactions on Circuits and Systems for Video Technology.