Abstract
Combined average encoding with vector quantization (VQ) encoding, a new self-embedding fragile watermarking scheme is proposed. To take into account watermark payload, localization accuracy and recovery quality, the 6-bit average-watermark of a 2×2 original block and the 8-bit VQ-watermark of a 4×4 block of image high-frequency component are generated and hidden in the corresponding mapping blocks of them based on secret key, respectively. To improve the tamper detection performance, the validity of a 2×2 block is determined by combining the average-watermark with the VQ-watermark. The average, VQ and inpainting recovery operations are executed in sequence to improve the recovery quality especially for a larger tampering ratio. Simulation results demonstrate that the proposed scheme not only provides a better invisibility and security against the known counterfeiting attacks, but also allows image recovery with an acceptable visual quality up to 70% tampering ratios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Han, S.-H., Chu, C.-H.: Content-based image authentication: current status, issues, and challenges. Int. J. Inf. Secur. 9, 19–32 (2010)
Haouzia, A., Noumeir, R.: Methods for image authentication: a survey. Multimed Tools Appl. 39, 1–46 (2008)
Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. on Image Processing (10), 1593–1601 (2001)
Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: ICIP 1999, Kobe, Japan, October 25-28 (1999)
He, H., Zhang, J., Chen, F.: Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Processing 89, 1557–1566 (2009)
Qian, Z., Feng, G., Feng, G.: Inpainting assisted self recovery with decreased embedding data. IEEE Signal Processing Letters 17(11), 929–932 (2010)
Qian, Z., Feng, G., Zhang, X., Wang, S.: Image self-embedding with high-quality restoration capability. Digital Signal Processing 21, 278–286 (2011)
Yang, C.W., Shen, J.J.: Recover the tampered image based on VQ indexing. Signal Processing 90, 331–343 (2010)
Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. on Information Forensics and Security 6(4), 1223–1232 (2011)
Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38(12), 2519–2529 (2005)
Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Electron. Imaging 11(4), 262–274 (2002)
Chang, C., Fan, Y., Tai, W.: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit. 40, 654–661 (2008)
He, H., Chen, F., Tai, H.-M., Kalker, T., Zhang, J.: Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans. on Information Forensics and Security 7(1), 185–196 (2012)
Elad, M., Starck, J.-L., Querre, P., Donoho, D.L.: Simultaneous cartoon and testure image inpainting using morphological component analysis (MCA). Appl. Comput. Harmon. Anal 10, 340–358 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
He, H., Chen, F., Huo, Y. (2013). Self-embedding Fragile Watermarking Scheme Combined Average with VQ Encoding. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)