A block-based watermarking scheme for image tamper detection and self-recovery

In this paper, we present an effective block-based digital fragile watermarking scheme for image tamper detection and recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. It adopts parity check and the intensity-relation check to thwart various malicious attacks. In the tamper detection process, instead of independently testing the embedded authentication data of each block, we take the block-neighbourhood into account and utilize a hierarchical structure to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively resist collage attack, vector quantization (VQ) attack and constant-average attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully self-recovered with acceptable visual quality.

[1]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[2]  Robert H. Deng,et al.  Security of an ill-posed operator for image authentication , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[4]  Po-Whei Huang,et al.  A hierarchical digital watermarking method for image tamper detection and recovery , 2005, Pattern Recognit..

[5]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[6]  Chun-Shien Lu,et al.  Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..

[7]  Ming-Shi Wang,et al.  A majority-voting based watermarking scheme for color image tamper detection and recovery , 2007, Comput. Stand. Interfaces.

[8]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[9]  Sheng-He Sun,et al.  Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.

[10]  Shih-Fu Chang,et al.  New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization , 2006, IEEE Trans. Multim..

[11]  Nasir Memon,et al.  Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..

[12]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.

[13]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2003, IEEE Trans. Multim..

[14]  P. Bao,et al.  Image adaptive watermarking using wavelet domain singular value decomposition , 2005 .

[15]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[16]  Deepa Kundur,et al.  Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[17]  A. Murat Tekalp,et al.  Hierarchical watermarking for secure image authentication with localization , 2002, IEEE Trans. Image Process..

[18]  Shinfeng D. Lin,et al.  Dual watermark for image tamper detection and recovery , 2008, Pattern Recognit..

[19]  Chin-Chen Chang,et al.  Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..

[20]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[21]  Phen-Lan Lin,et al.  (Pattern Recoginition,38:2519-2529)A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery , 2005 .

[22]  A. Murat Tekalp,et al.  Lossless watermarking for image authentication: a new framework and an implementation , 2006, IEEE Transactions on Image Processing.

[23]  Susanto Rahardja,et al.  Fast intermode decision in H.264/AVC video coding , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[24]  Ping Wah Wong,et al.  A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[25]  Wenkai Lu,et al.  Localized 2-D filter-based linear coherent noise attenuation , 2001, IEEE Trans. Image Process..

[26]  Xin Sun,et al.  New semi-fragile authentication watermarking , 2002 .

[27]  Chun-Wei Yang,et al.  Recover the tampered image based on VQ indexing , 2010, Signal Process..

[28]  Shan Suthaharan,et al.  Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..

[29]  Chin-Chen Chang,et al.  A watermarking-based image ownership and tampering authentication scheme , 2006, Pattern Recognit. Lett..

[30]  R. H. Deng,et al.  Security of an ill-posed operator for image authentication , 2005 .

[31]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[32]  Karl M. Göschka,et al.  Client and Legacy Integration in Object-Oriented Web Engineering , 2001, IEEE Multim..

[33]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[34]  Chun-Shien Lu,et al.  Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.

[35]  Jiri Fridrich,et al.  New fragile authentication watermark for images , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[36]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.