Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication
详细信息    查看全文
  • 作者:Chunlei Li ; Aihua Zhang ; Zhoufeng Liu ; Liang Liao…
  • 关键词:Semi ; fragile ; Self ; recoverable ; Tamper detection ; Group quantization ; Double authentication ring
  • 刊名:Multimedia Tools and Applications
  • 出版年:2015
  • 出版时间:December 2015
  • 年:2015
  • 卷:74
  • 期:23
  • 页码:10581-10604
  • 全文大小:3,496 KB
  • 参考文献:1.Anthony TS, Zhu XX, Shen J (2008) Fragile Watermarking based on encoding of the zeroes of the Z-Transform. IEEE Trans Inf Forensic Secur 3(3):567–569CrossRef
    2.Celik MU, Sharma G, Saber E et al (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11(6):585–595CrossRef
    3.Chamlawi RA, Khan A (2010) Digital image authentication and recovery: sinteger transform based information embedding and extraction. Inf Sci 180:4909–4928MathSciNet CrossRef
    4.Chamlawi R, Khan A, Usman I (2010) Authentication and recovery of images using multiple watermarks. Comput Electr Eng 36:578–584CrossRef MATH
    5.Fridrich J, Goljan M (1999) Protection of digital images using self embedding. In: Content security and data hiding in digital media. NJIT
    6.Fridrich J, Goljan M, Memon N (2002) Cryptanalysis of the yeungmintzer fragile watermarking technique. J Electron Imaging 11(4):262–274
    7.He HJ, Zhang JS, Tai HM (2008) Block-chain based watermarking scheme with superior localization. In: IHW, pp 137–160
    8.He HJ, Zhang JS, Tai HM (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Proc:1557–1566
    9.He HJ, Zhang JS, Tai HM (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization. In: IHW, pp 132–145
    10.Holliman M, Memon N (2010) Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes. IEEE Trans Image Process 3(10):432–441
    11.Hung KL, Chang CC, Chen TS (2001) Secure discrete cosine transform based technique for recoverable tamper proofing. Opt Eng 40:1950–1958CrossRef
    12.Kim KS, Lee MJ, Lee JW et al (2011) Region-based tampering detection and recovery using homogeneity analysis in quality-sensitive imaging. Comput Vis Image Underst 115:1308–1323CrossRef
    13.Kurato M, Sun Q, Chang SF (2006) New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization. IEEE Trans Multimedia 8(1):32–45CrossRef
    14.Lee TY, Lin SD (2008) Dual watermark for image tamper detection and recovery. Pattern Recog 41:3497–3506CrossRef MATH
    15.Li KF, Chen TS, Wu SC (2001) Image tamper detection and recovery system based on discrete wavelet transformation. In: Proceedings of the international conference on communications, computers, and signal processing
    16.Li CT, Si H (2007) Wavelet-based fragile watermarking scheme for image authentication. J Electron Imaging 16(1):134–148
    17.Li GB, Pei SW, Chen G et al (2009) A Self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coefficient. In: Proceedings of the 2009 13th international conference on computer supported cooperative work in design, pp 107–112
    18.Li CL, Wang YH, Ma B, Zhang ZX (2011) A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. Comput Electr Eng 37:927–940CrossRef
    19.Li CL, Wang YH, Ma B, Zhang ZX (2012) Tampering Detection and Self-recovery of Biometric Templates Using Salient Region-based Authentication Watermarking. Comput Stand Interfaces 34(4):367–379CrossRef
    20.Li CL, Wang YH, Ma B, Zhang ZX (2012) Multi-block dependency based fragile watermarking scheme for fingerprint images protection. Multimedia Tools Appl:1–20
    21.Li CL, Wang YH, Ma B et al (2012) A secure semi-fragile self-recoverable watermarking algorithm using group-based wavelet quantization. In: The 13rd pacific-rim conference on multimedia. Singapore, pp 327–336
    22.Lin PL, Hsieh CK, Huang PW (2005) A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recog 38(12):2519–2529CrossRef
    23.Liu SH, Yao HX, Gao W et al (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185:869–882CrossRef MATH
    24.Liu HM, Rao JH, Yao XZ (2008) Feature based watermarking scheme for image authentication. Int Conf Multimedia:229–232
    25.Liu H, Yao X, Huang J (2010) Semi-fragile Zernike moment-based image watermarking for authentication. EURASIP J Adv Signal Proc:1–17
    26.MeenakshiDevi P, Venkatesan M, Duraiswamy K (2009) A fragile watermarking scheme for image authentication with tamper localization using integer wavelet transform. J Comput Sci 5(11):831–837CrossRef
    27.Noriega JM, Kurkoski B, Nakano MM et al (2010) Halftoning-based self-embedding watermarking for image authentication and Recovery. IEEE Int Midwest Symp Circ Syst:612–615
    28.Phadikar A, Maity S, Mandal M (2012) Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J Vis Commun Image Represent 23:454–466CrossRef
    29.Peng ZN, Liu WB (2008) Color image authentication based on spatiotemporal chaos and SVD. Chaos Solitons Fractals:946–952
    30.Qi X, Xin X (2011) A quantization-based semi-fragile watermarking scheme for image content authentication. J Vis Commun Image Represent 22:187–200CrossRef
    31.Solorio SB, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localization and self-recoverable capabilities. Signal Proc 91:728–739CrossRef MATH
    32.Stinson DR (1995) Cryptography: theory and practice. CRC Press
    33.Tsai MJ, Chien C (2008) Authentication and recovery for wavelet-based semifragile watermarking. Opt Eng 47(6):1–9CrossRef
    34.Wang JW, Lian SG, Dai YW (2008) Secure multimedia watermarking authentication in wavelet domain. J Electron Imaging 17(3):033010CrossRef
    35.Watson AB (1993) Visual optimization of DCT quantization matrices for individual images. In: Proceedings AIAA computing in aerospace, vol 9, pp 286–291
    36.Wong P (1998) A public key watermark for image verification and authentication. Int Conf Image Process 1:455–459
    37.Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10):1593–1601CrossRef MATH
    38.Yu M, He HJ, Zhang JS (2007) A digital authentication watermarking scheme for JPEG images with superior localization and security. Sci China Series F: Inf Sci 50(3):491–509MathSciNet CrossRef MATH
    39.Zhang JS, Tian L (2004) A new chaotic digital watermarking method based on private key. J China Inst Commun 25(8):98–101
    40.Zhang J, Tian L, HM Tai (2004) A new watermarking method based on chaotic maps. In: Proceedings IEEE ICME’04
    41.Zhang XP, Wang SZ (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Proc 89:675–679CrossRef MATH
    42.Zhang XP, Wang SZ, Qian ZX et al (2011) Reference Sharing Mechanism for Watermark Self-Embedding. IEEE Trans Image Process 20(2):485–495MathSciNet CrossRef
    43.Zhu X, Ho AT, Marziliano P (2007) A new semi-fragile image watermarking with robust tampering restoration using irregular sampling. Signal Process Image Commun 22(5):515–528
  • 作者单位:Chunlei Li (1)
    Aihua Zhang (1)
    Zhoufeng Liu (1)
    Liang Liao (1)
    Di Huang (2)

    1. School of Electronic and Information Engineering, Zhongyuan University of Technology, ZhengZhou, 450007, China
    2. State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, 10091, China
  • 刊物类别:Computer Science
  • 刊物主题:Multimedia Information Systems
    Computer Communication Networks
    Data Structures, Cryptology and Information Theory
    Special Purpose and Application-Based Systems
  • 出版者:Springer Netherlands
  • ISSN:1573-7721
文摘
Semi-fragile self-recoverable watermarking algorithms are important to meet various requirements such as security, robustness, localization, and image recovery. However, current approaches are not adequate for this importance. Thus, we propose a novel semi-fragile and self-recoverable watermarking algorithm based on a group quantization and double authentication method. In the proposed algorithm, a target image is first split into 16 ×16 image blocks. For each image block, a five-bit authentication watermark is generated from the first-order statistical moment of the block and then is embedded into the mid-frequency band of another image block by a novel group-based wavelet quantization method. With the generated watermarks, image security is enhanced by randomly permuting coefficients among a group and image robustness is improved by embedding the watermark in the largest coefficient inside a sub-group by significant difference parity quantization. The proposed double authentication ring structure effectively improves the image localization accuracy. Recovered image is a better approximate to the original image. Experimental comparisons of ours with other algorithms shows the effectiveness of the proposed self-recoverable and semi-fragile watermarking algorithm.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700