A self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coefficient

In the realm of Computer Supported Cooperative Work in Design (CSCWD), how to ensure the authenticity and integrity of an image plays important roles. This paper presents a novel semi-fragile image watermarking scheme for authenticating and recovering image content. The scheme also shows strong robustness on those images' content reserved operations. It can precisely detect and locate malicious operations and tampers, and recover main content of tampered image region. Firstly, it assigns the exclusive precursor block and successor block for every block to be a block circle link, and regards the function mapping result of DCT coefficients of neighboring blocks as watermark, and embeds it into middle-frequency domain of DCT coefficients of successor block to form a watermarked image. Secondly, it verifies the blocks, which have been maliciously operated and tampered, by detecting whether the DCT coefficients of neighboring blocks satisfy the Relationship Function after operations. Thirdly, it uses corresponding Relationship Function of neighboring blocks in the link to estimate DCT direct current coefficients (DC) and low-frequency coefficients of the tampered blocks and recovers their main content. The experimental results show that the scheme is effective and feasible.

[1]  Jaejin Lee,et al.  A watermarking sequence using parities of error control coding for image authentication and correction , 2000, IEEE Trans. Consumer Electron..

[2]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[3]  Tiago Rosa Maria Paula Queluz Towards robust, content based techniques for image authentication , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[4]  Mohamed F. Mansour,et al.  Robust high capacity data embedding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[5]  Ching-Yung Lin Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection , 2000 .

[6]  Wen-Shyong Hsieh,et al.  Image refining technique using digital watermarking , 2000, IEEE Trans. Consumer Electron..

[7]  Jiri Fridrich,et al.  Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[8]  Hung-Hsu Tsai,et al.  GA-based adaptive image watermarking with JND profile and fuzzy inference system , 2005 .

[9]  D. Hatzinakos,et al.  Semi-blind image restoration based on telltale watermarking , 1998, Conference Record of Thirty-Second Asilomar Conference on Signals, Systems and Computers (Cat. No.98CH36284).

[10]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[11]  Shih-Fu Chang,et al.  SARI: self-authentication-and-recovery image watermarking system , 2001, MULTIMEDIA '01.

[12]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[13]  Mitchell D. Swanson,et al.  Multimedia Authentication and Watermarking , 2003 .

[14]  Ammar M. Hassan,et al.  Tamper detection with self-correction hybrid spatial-DCT domains image authentication technique , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).