Abstract
Numerous image authentication techniques have been devised to address the potential security issue of malicious tampering with image content since digital images can be easily duplicated, modified, transformed and diffused via the Internet transmission. However, the existing works still remain many shortcomings in terms of the recovery incapability and detection accuracy with extensive tampering. To improve the performance of tamper detection and image recovery, we present a block mapping and dual-matrix-based watermarking scheme for image authentication with self-recovery capability in this paper. The to-be-embedded watermark information is composed of the authentication data and recovery data. The Authentication Feature Composition Calculation algorithm is proposed to generate the authentication data for image tamper detection and localization. Furthermore, the recovery data for tampered region recovery is comprised of self-recovery bits and mapped-recovery bits. The Set Partition in Hierarchical Trees encoding algorithm is applied to obtain the self-recovery bits, whereas the Rehashing Model-based Block Mapping algorithm is proposed to obtain the mapped-recovery bits for retrieving the damaged codes caused by tampering. Subsequently, the watermark information is embedded into the original image as digital watermarking with the guidance of a dual-matrix. The experimental results demonstrate that comparing with other state-of-the-art works, our proposed scheme not only improves the performance in recovery, but also extends the limitation of tampering rate up to 90%. Furthermore, it obtains a desirable image quality above 40 dB, large watermark payload up to 3.169 bpp, and the effective resistance to malicious attack, such as copy-move and collage attacks.
Funder
the Youth Research Fund of Anhui University of Information Technology
Publisher
Public Library of Science (PLoS)
Reference36 articles.
1. Secure and Robust Two-Phase Image Authentication;SAH Tabatabaei;IEEE Transactions on Multimedia,2015
2. Hybrid LSTM and Encoder–Decoder Architecture for Detection of Image Forgeries;JH Bappy;IEEE Transactions on Image Processing,2019
3. A Semi-fragile Reversible Watermarking for Authenticating 3D Models Based on Virtual Polygon Projection and Double Modulation Strategy;F Peng;IEEE Transactions on Multimedia,2021
4. Multi-Scale Fusion for Improved Localization of Malicious Tampering in Digital Images;P Korus;IEEE Transactions on Image Processing,2016
5. Sequential and Patch Analyses for Object Removal Video Forgery Detection and Localization;M Aloraini;IEEE Transactions on Circuits and Systems for Video Technology,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Image authentication with exclusive-OR operated optical vortices;Journal of the Optical Society of America A;2024-06-18
2. Enhancing Medical Image Security through Steganography and Ensemble Deep Authentication;2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI);2024-05-09