Image tamper detection and multi-scale self-recovery using reference embedding with multi-rate data protection

This paper proposes a multi-scale self-recovery (MSSR) approach to protect images against content forgery. The main idea is to provide more resistance against image tampering while enabling the recovery process in a multi-scale quality manner. In the proposed approach, the reference data composed of several parts and each part is protected by a channel coding rate according to its importance. The first part, which is used to reconstruct a rough approximation of the original image, is highly protected in order to resist against higher tampering rates. Other parts are protected with lower rates according to their importance leading to lower tolerable tampering rate (TTR), but the higher quality of the recovered images. The proposed MSSR approach is an efficient solution for the main disadvantage of the current methods, which either recover a tampered image in low tampering rates or fails when tampering rate is above the TTR value. The simulation results on 10000 test images represent the efficiency of the multi-scale self-recovery feature of the proposed approach in comparison with the existing methods.

[1]  Zhoufeng Liu,et al.  Semi-fragile self-recoverable watermarking scheme for face image protection , 2016, Comput. Electr. Eng..

[2]  Suhas N. Diggavi,et al.  Matched multiuser Gaussian source-channel communications via uncoded schemes , 2015, ISIT.

[3]  Xinpeng Zhang,et al.  Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy , 2017, Signal Process..

[4]  Ahad Harati,et al.  TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique , 2017, J. Vis. Commun. Image Represent..

[5]  Chu-Hsing Lin,et al.  Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks , 2010 .

[6]  Amir Hossein Mohajerzadeh,et al.  TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA , 2018, ArXiv.

[7]  V. Kamakshi Prasad,et al.  Improved image tamper localisation using chaotic maps and self-recovery , 2017, J. Vis. Commun. Image Represent..

[8]  Aboul Ella Hassanien,et al.  An effective SVD-based image tampering detection and self-recovery using active watermarking , 2014, Signal Process. Image Commun..

[9]  Jinwei Wang,et al.  Hierarchical recovery for tampered images based on watermark self-embedding , 2017, Displays.

[10]  Dongmei Niu,et al.  Reference Sharing Mechanism-Based Self-Embedding Watermarking Scheme with Deterministic Content Reconstruction , 2018, Secur. Commun. Networks.

[11]  Shu-Fen Tu,et al.  Image tamper detection and recovery using adaptive embedding rules , 2016 .

[12]  Safya Belghith,et al.  Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme , 2016, Multimedia Tools and Applications.

[13]  Aliazam Abbasfar,et al.  Source-channel coding-based watermarking for self-embedding of JPEG images , 2018, Signal Process. Image Commun..

[14]  Wei-Liang Tai,et al.  Image self-recovery with watermark self-embedding , 2018, Signal Process. Image Commun..

[15]  Chi-Man Pun,et al.  Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Mohammad Ali Akhaee,et al.  A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery , 2015, IEEE Transactions on Image Processing.

[17]  Xinpeng Zhang,et al.  Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode , 2016, Inf. Sci..

[18]  Durgesh Singh,et al.  DCT based efficient fragile watermarking scheme for image authentication and restoration , 2015, Multimedia Tools and Applications.

[19]  Pawel Korus,et al.  Efficient Method for Content Reconstruction With Self-Embedding , 2013, IEEE Transactions on Image Processing.

[20]  Xingming Sun,et al.  A passive authentication scheme for copy-move forgery based on package clustering algorithm , 2016, Multimedia Tools and Applications.

[21]  Yuan Jiang A Practical Guide to Error-Control Coding Using MATLAB , 2010 .

[22]  Fredrik Lindqvist,et al.  Cryptographically Secure CRC for Lightweight Message Authentication , 2015, IACR Cryptol. ePrint Arch..