CRT-based fragile self-recovery watermarking scheme for image authentication and recovery

Fragile watermarking is one of the effective techniques for authentication of digital documents and images. However, recovering the content of the tampered region in a watermarked image is a challenging task while considering conflicting criteria of imperceptibility and watermark embedding capacity. In this paper we propose a Chinese remainder theorem (CRT)-based watermarking scheme which can recover the original contents in the tampered region of the digital content while maintaining imperceptibility criterion. High peak signal to noise ratio (PSNR) and large watermark capacity can be achieved by using the CRT-based embedding scheme. Since only modular operations are involved in computation of the CRT-based technique, it provides computational advantage as it involves only modular arithmetic. Besides, CRT-based technique introduces additional security to the watermarking scheme. By taking several digital images, we have shown that the proposed technique can recover the tampered contents effectively. We have also considered forgery detection on a digital cheque, eCheque, and shown that the proposed technique can detect and recover the original content from the forged cheque.

[1]  Binh Pham,et al.  Semi fragile watermark with self authentication and self recovery , 2009 .

[2]  Jagdish Chandra Patra,et al.  WMicaD: A New Digital Watermarking Technique Using Independent Component Analysis , 2008, EURASIP J. Adv. Signal Process..

[3]  E M Van Buskirk,et al.  When seeing isn't believing. , 1997, Journal of glaucoma.

[4]  Xu Shu,et al.  Research on image self-recovery algorithm based on DCT , 2010, J. Multim..

[5]  Zhenxing Qian,et al.  Image self-embedding with high-quality restoration capability , 2011, Digit. Signal Process..

[6]  Huifang Sun,et al.  Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms, and Standards , 1999 .

[7]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[8]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[9]  Chun-Wei Yang,et al.  Recover the tampered image based on VQ indexing , 2010, Signal Process..

[10]  Shih-Fu Chang,et al.  SARI: self-authentication-and-recovery image watermarking system , 2001, MULTIMEDIA '01.

[11]  Jiashu Zhang,et al.  Adjacent-block based statistical detection method for self-embedding watermarking techniques , 2009, Signal Process..

[12]  Jagdish Chandra Patra,et al.  A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression , 2010, Digit. Signal Process..

[13]  Jagdish Chandra Patra,et al.  A novel CRT-based watermarking technique for authentication of multimedia contents , 2010, Digit. Signal Process..

[14]  Asoke K. Nandi,et al.  Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities , 2011, Signal Process..

[15]  William Stallings,et al.  Cryptography and Network Security (4th Edition) , 2005 .

[16]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.