Abstract
In this paper, a self-recovery fragile watermarking scheme for image authentication is proposed to improve the performance of tamper detection and tamper recovery. The proposed scheme embeds the encrypted feature comprising 6-bit recovery data and 2-bit key-based data of the image block into the least significant bits (LBS) of its mapping block. The validity of a test block is determined by comparing the number of inconsistent blocks in the 3×3 block-neighborhood of the test block with that of its mapping block. Moreover, to improve the quality of the recovered image, the 3×3 block-neighborhood is also used to recover the tampered blocks whose feature hidden in another block is corrupted. Experimental result demonstrates that the proposed method outperforms conventional self-recovery fragile watermarking algorithms in tamper detection and tamper recovery under various attacks. Additionally, the proposed scheme is not vulnerable to the collage attack, constant-average attack and four-scanning attack.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image process. 10(10), 1593–1601 (2001)
Yuan, H., Zhang, X.-P.: Multiscale fragile watermarking based on the Gaussian mixture model. IEEE Trans. Image process. 15(10), 3189–3200 (2006)
Zhang, X., Wang, S.: Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process. Lett. 14(10), 727–731 (2007)
He, H.-J., Zhang, J.-S., Tai, H.-M.: Block-chain Based fragial watermarking Scheme with Superior Localization. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 147–160. Springer, Heidelberg (2008)
Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proceedings of IEEE 87(7), 1167–1180 (1999)
Fridrich, J., Goljan, M.: Protection of digital images using self embedding. In: Content Security and Data Hiding in Digital Media, NJIT, NJ (May 1999)
Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38(12), 2519–2529 (2005)
Wang, M.S., Chen, W.C.: A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces 29(5), 561–570 (2007)
Lee, T.-Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recognition 41, 3497–3506 (2008)
Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Processing 9(3), 432–441 (2000)
Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J. Electronic Imaging 11, 262–274 (2002)
Chang, C., Fan, Y.-H., Tai, W.-L.: Four-scanning attack on hierarchical digital watermark-ing method for image tamper detection and recovery. Pattern Recognition 41(2), 654–661 (2008)
He, H.J., Zhang, J.S., Wang, H.X.: Synchronous counterfeiting attacks on self-embedding watermarking schemes. Intern. J. Comput. Sci. Network Security 6(1), 251–257 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
He, HJ., Zhang, JS., Tai, HM. (2009). Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. In: Katzenbeisser, S., Sadeghi, AR. (eds) Information Hiding. IH 2009. Lecture Notes in Computer Science, vol 5806. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04431-1_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-04431-1_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04430-4
Online ISBN: 978-3-642-04431-1
eBook Packages: Computer ScienceComputer Science (R0)