Fragile Watermarking with Self-recovery Capability via Absolute Moment Block Truncation Coding
详细信息    查看全文
  • 关键词:Fragile watermarking ; AMBTC ; Tampering detection ; Content recovery
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:10039
  • 期:1
  • 页码:104-113
  • 全文大小:1,170 KB
  • 参考文献:1.Chang, C., Hu, Y., Lu, T.: A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn. Lett. 27(5), 439–446 (2006)CrossRef
    2.Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. 27(2), 340–352 (2015)MathSciNet CrossRef
    3.Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.​1109/​TPDS.​2015.​2506573
    4.Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98-B(1), 190–200 (2015)CrossRef
    5.Xia, Z., Wang, X., Sun, X., Wang, B.: Steganalysis of least significant bit matching using multi-order differences. Secur. Commun. Netw. 7(8), 1283–1291 (2014)CrossRef
    6.Xia, Z., Wang, X., Sun, X., Liu, Q., Xiong, N.: Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl. 75(4), 1947–1962 (2016)CrossRef
    7.Lin, P., Hsieh, C., Huang, P.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519–2529 (2005)CrossRef
    8.Lee, T., Lin, S.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)CrossRef MATH
    9.Zhang, X., Wang, S., Qian, Z., Feng, G.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485–495 (2011)MathSciNet CrossRef
    10.Tsou, C., Hu, Y., Chang, C.: Efficient optimal pixel grouping schemes for AMBTC. Imaging Sci. J. 56(4), 217–231 (2008)CrossRef
    11.Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)CrossRef
    12.Yang, C., Shen, J.: Recover the tampered image based on VQ indexing. Sig. Process. 90, 331–343 (2010)CrossRef MATH
  • 作者单位:Ping Ji (17) (18)
    Chuan Qin (17) (18)
    Zhenjun Tang (17)

    17. Guangxi Key Lab of Multi-source Information Mining and Security, Guangxi Normal University, Guilin, 541004, China
    18. School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai, 200093, China
  • 丛书名:Cloud Computing and Security
  • ISBN:978-3-319-48671-0
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
  • 卷排序:10039
文摘
In this paper, we propose a fragile image watermarking scheme based on Absolute Moment Block Truncation Coding (AMBTC) and self-embedding. According to the constructed binary map and two reconstruction levels, each non-overlapping block in original image can be compressed with the AMBTC algorithm. Then, after scrambling, the compression codes are extended through a random matrix, which can introduce more redundancy into the reference bits to be embedded for content recovery. Also, the relationship between each image block and each reference bit is built so that the recoverable area for tampered image can be increased. Experimental results demonstrate the effectiveness of the proposed scheme.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700