Watermarking Framework for Authentication and Self-recovery of Tampered Colour Images

Methods of authentication and self-recovery of tampered information in digital images have been in constant development during the last years. These frameworks are developed by watermarking techniques, which generate an image digest, which is embedded inside the image that must be protected. In this paper, a method of authentication and self-recovery of tampered information in digital images is proposed. Our approach first generates the authentication watermarks, which are based on XOR operations on non-overlapping blocks, subsequently by using a halftoning technique the recovery watermark is generated. To have a higher performance, three copies of each watermark are embedded to have more chance to extract the recovery watermark. To evaluate the quality of the obtained images, the objective criterion of peak signal-to-noise ratio (PSNR) and Structural Similarity Index (SSIM) are used. The experimental results demonstrate the effectiveness of our method in comparisons with other schemes reported in the literature, where the quality of the watermarked images, the quality of the reconstruction images and the recovery rate of each scheme were evaluated.

[1]  H. P. Pérez Meana,et al.  An Inverse Halftoning Algorithms Based on Neural Networks and Atomic Functions , 2017, IEEE Latin America Transactions.

[2]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[3]  E. Vera,et al.  An Implementation of Reversible Watermarking for Still Images , 2013, IEEE Latin America Transactions.

[4]  Niranjan Damera-Venkata,et al.  Fast blind inverse halftoning , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[5]  Michael Elad,et al.  Image Processing Using Smooth Ordering of its Patches , 2012, IEEE Transactions on Image Processing.

[6]  H. P. Meana,et al.  Watermarking-based Color Image Authentication with Detection and Recovery Capability , 2016, IEEE Latin America Transactions.

[7]  A. S. Brandão,et al.  Artificial Neural Networks Applied to Image Steganography , 2016, IEEE Latin America Transactions.

[8]  Bo Zhang,et al.  An Image Encryption Scheme Based on Cross Chaotic Map , 2008, 2008 Congress on Image and Signal Processing.

[9]  D. Renza,et al.  Text Hiding in Images Based on QIM and OVSF , 2016, IEEE Latin America Transactions.

[10]  Yue Chen,et al.  A novel chaos-based fragile watermarking for image tampering detection and self-recovery , 2013, Signal Process. Image Commun..

[11]  Aboul Ella Hassanien,et al.  An effective SVD-based image tampering detection and self-recovery using active watermarking , 2014, Signal Process. Image Commun..

[12]  Sanjay Kumar Singh,et al.  Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability , 2016, J. Vis. Commun. Image Represent..

[13]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..