Self-embedding fragile watermarking based on DCT and fast fractal coding

A self-embedding fragile watermarking scheme is proposed in this paper, which is based on Discrete Cosine Transform and fractal compression coding. To overcome the high computational complexity of fractal coding, a fast coding method is also presented that improves the efficiency of fractal block coding in the watermarking procedure. In our algorithm, three kinds of watermarks are generated for image authentication and recovery, which is based on an interleaved and overlapped 8 ×8 image block structure. This makes our method obtain an authentication granularity of 4 ×4 approximately. At the same time, we take advantage of two levels of mapping to select mapping block for every image block. Three versions of recovery watermarks for each block are embedded in different quadrants, which provides another two chances for block recovery in case one is destroyed. Experimental results demonstrate that the proposed scheme not only outperforms conventional self-embedding fragile watermarking algorithms in tamper recovery, but also improves the security against the various counterfeiting attacks.

[1]  Zhenxing Qian,et al.  Watermarking With Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Zhenxing Qian,et al.  Inpainting Assisted Self Recovery With Decreased Embedding Data , 2010, IEEE Signal Processing Letters.

[3]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[4]  Chin-Chen Chang,et al.  Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism , 2012, Signal Process..

[5]  A. Murat Tekalp,et al.  A hierarchical image authentication watermark with improved localization and security , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[6]  Heng-Ming Tai,et al.  A neighborhood-characteristic-based detection model for statistical fragile watermarking with localization , 2010, Multimedia Tools and Applications.

[7]  Zhenxing Qian,et al.  Self-embedding watermark with flexible restoration quality , 2011, Multimedia Tools and Applications.

[8]  Arnaud E. Jacquin,et al.  Image coding based on a fractal theory of iterated contractive image transformations , 1992, IEEE Trans. Image Process..

[9]  Shaocheng Tong,et al.  Adaptive Fuzzy Control via Observer Design for Uncertain Nonlinear Systems With Unmodeled Dynamics , 2013, IEEE Transactions on Fuzzy Systems.

[10]  Minerva M. Yeung,et al.  Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.

[11]  Pawel Korus,et al.  Efficient Method for Content Reconstruction With Self-Embedding , 2013, IEEE Transactions on Image Processing.

[12]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[13]  Gaurav Bhatnagar,et al.  A new aspect in robust digital watermarking , 2011, Multimedia Tools and Applications.

[14]  Liu Yang,et al.  Segmentation-based Image Authentication and Recovery Scheme Using Reference Sharing Mechanism , 2012, 2012 International Conference on Industrial Control and Electronics Engineering.

[15]  Shaocheng Tong,et al.  Robust Adaptive Tracking Control for Nonlinear Systems Based on Bounds of Fuzzy Approximation Parameters , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[16]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[17]  Shinfeng D. Lin,et al.  An Image Watermarking Scheme with Tamper Detection and Recovery , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[18]  Heng-Ming Tai,et al.  Chaos-based self-embedding fragile watermarking with flexible watermark payload , 2012, Multimedia Tools and Applications.

[19]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[20]  Claudia Feregrino Uribe,et al.  Watermarking using similarities based on fractal codification , 2012, Digit. Signal Process..

[21]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[22]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[23]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[24]  Nasir D. Memon,et al.  Cryptanalysis of the Yeung - Mintzer fragile watermarking technique , 2002, J. Electronic Imaging.

[25]  Yan-Jun Liu,et al.  Adaptive fuzzy control for a class of uncertain nonaffine nonlinear systems , 2007, Inf. Sci..

[26]  Safya Belghith,et al.  A novel method for tamper detection and recovery resistant to Vector Quantization attack , 2009, 2009 6th International Multi-Conference on Systems, Signals and Devices.

[27]  Mohsen Ebrahimi Moghaddam,et al.  A multi-purpose digital image watermarking using fractal block coding , 2011, J. Syst. Softw..

[28]  Jiashu Zhang,et al.  Adjacent-block based statistical detection method for self-embedding watermarking techniques , 2009, Signal Process..

[29]  Hyoungshick Kim,et al.  An image encryption scheme with a pseudorandom permutation based on chaotic maps , 2010 .

[30]  Michael F. Barnsley,et al.  Fractals everywhere , 1988 .

[31]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[32]  Helen Treharne,et al.  A Novel Semi-Fragile Image Watermarking, Authentication and Self-Restoration Technique Using the Slant Transform , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[33]  Lili Liu,et al.  An Image Authentication Scheme with Localization and Recovery , 2008, 2008 Congress on Image and Signal Processing.

[34]  Zhenxing Qian,et al.  Image self-embedding with high-quality restoration capability , 2011, Digit. Signal Process..

[35]  Xingyuan Wang,et al.  A novel image recovery method based on discrete cosine transform and matched blocks , 2013 .