Author:
Lin Chia-Chen,Lee Ting-Lin,Chang Ya-Fen,Shiu Pei-Feng,Zhang Bohan
Abstract
Digital images have unique features that include being both easily transmittable over the Internet and being easy to tamper. With the advancement of digital processing techniques and an increasing number of valuable digital images being transmitted via the Internet, image authentication has been made more crucial than ever. In this paper, we present an image authentication scheme with tamper localization and self-recovery using fragile watermarking. We embed the fragile watermarks consisting of the authentication code and the recovery information onto the image to verify its integrity. The proposed fragile watermarking scheme can authenticate the image without accessing the original image, localizing the modifications as well as verifying the integrity, and even reconstructing the tampered regions. We use an AMBTC compressed code as the authentication code to minimize the distortion introduced by embedding. To reduce the blocking effect that occurs in the reconstructed image, a VQ compressed code is applied instead of the average intensity as the recovery information. Several representative test images and 200 different test images were randomly selected from BOWS to examine the performance of the proposed scheme. Experimental results confirm that the proposed scheme can effectively resist a cutting attack and a copy-paste attack while retaining the high accuracy of tamper localization. The average TPR and average FTP rate were around 97% and 0.12%, respectively, while maintaining the image quality of the watermarked image and restoring the image at up to 48 dB and 39.28 dB, respectively.
Funder
National Science and Technology Council Taiwan
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference26 articles.
1. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique;Fridrich;J. Electron. Imaging,2002
2. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery;Chang;Pattern Recognit.,2008
3. Zhang, X., Wang, S., and Feng, G. (2009). International Workshop on Digital Watermarking, Springer.
4. Reference Sharing Mechanism for Watermark Self-Embedding;Zhang;IEEE Trans. Image Process.,2011
5. A Hierarchical Fragile Watermarking with VQ Index Recovery;Lee;J. Multimed.,2011
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献