Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization

  • Conference paper
Information Hiding (IH 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5806))

Included in the following conference series:

Abstract

In this paper, a self-recovery fragile watermarking scheme for image authentication is proposed to improve the performance of tamper detection and tamper recovery. The proposed scheme embeds the encrypted feature comprising 6-bit recovery data and 2-bit key-based data of the image block into the least significant bits (LBS) of its mapping block. The validity of a test block is determined by comparing the number of inconsistent blocks in the 3×3 block-neighborhood of the test block with that of its mapping block. Moreover, to improve the quality of the recovered image, the 3×3 block-neighborhood is also used to recover the tampered blocks whose feature hidden in another block is corrupted. Experimental result demonstrates that the proposed method outperforms conventional self-recovery fragile watermarking algorithms in tamper detection and tamper recovery under various attacks. Additionally, the proposed scheme is not vulnerable to the collage attack, constant-average attack and four-scanning attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image process. 10(10), 1593–1601 (2001)

    Article  MATH  Google Scholar 

  2. Yuan, H., Zhang, X.-P.: Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans. Image process. 15(10), 3189–3200 (2006)

    Article  Google Scholar 

  3. Zhang, X., Wang, S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727–731 (2007)

    Article  Google Scholar 

  4. He, H.-J., Zhang, J.-S., Tai, H.-M.: Block-chain Based fragial watermarking Scheme with Superior Localization. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 147–160. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proceedings of IEEE 87(7), 1167–1180 (1999)

    Article  Google Scholar 

  6. Fridrich, J., Goljan, M.: Protection of digital images using self embedding. In: Content Security and Data Hiding in Digital Media, NJIT, NJ (May 1999)

    Google Scholar 

  7. Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38(12), 2519–2529 (2005)

    Article  Google Scholar 

  8. Wang, M.S., Chen, W.C.: A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces 29(5), 561–570 (2007)

    Article  Google Scholar 

  9. Lee, T.-Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recognition 41, 3497–3506 (2008)

    Article  MATH  Google Scholar 

  10. Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)

    Article  Google Scholar 

  11. Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J. Electronic Imaging 11, 262–274 (2002)

    Article  Google Scholar 

  12. Chang, C., Fan, Y.-H., Tai, W.-L.: Four-scanning attack on hierarchical digital watermark-ing method for image tamper detection and recovery. Pattern Recognition 41(2), 654–661 (2008)

    Article  MATH  Google Scholar 

  13. He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on self-embedding watermarking schemes. Intern. J. Comput. Sci. Network Security 6(1), 251–257 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

He, HJ., Zhang, JS., Tai, HM. (2009). Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. In: Katzenbeisser, S., Sadeghi, AR. (eds) Information Hiding. IH 2009. Lecture Notes in Computer Science, vol 5806. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04431-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04431-1_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04430-4

  • Online ISBN: 978-3-642-04431-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics