Fragile Watermarking for Color Images Using Thresholding Technique
Authors: Kuo-Cheng Liu
Abstract:
In this paper, we propose ablock-wise watermarking scheme for color image authentication to resist malicious tampering of digital media. The thresholding technique is incorporated into the scheme such that the tampered region of the color image can be recovered with high quality while the proofing result is obtained. The watermark for each block consists of its dual authentication data and the corresponding feature information. The feature information for recovery iscomputed bythe thresholding technique. In the proofing process, we propose a dual-option parity check method to proof the validity of image blocks. In the recovery process, the feature information of each block embedded into the color image is rebuilt for high quality recovery. The simulation results show that the proposed watermarking scheme can effectively proof the tempered region with high detection rate and can recover the tempered region with high quality.
Keywords: thresholding technique, tamper proofing, tamper recovery
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1063342
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1634References:
[1] C.-T. Li and Huayin Si, "Wavelet-based fragile watermarking scheme for image authentication,"Journal Electron. Imaging, vol. 16, no. 1, 013009, 2007.
[2] H.-J. He, J.-S. Zhang, and F. Chen, "Adjacent-block based statistical detection method for self-embedding watermarking techniques," Signal Processing, vol. 89, no. 8, pp. 1557-1566, 2009.
[3] P.-L. Lin, C.-K. Hsieh, and P.-W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 38, pp. 2519-2529, 2005.
[4] S. D. Lin, Y.-C. Kuo, and M.-H. Yao, "An image watermarking scheme with tamper detection and recovery," Int. Journal of Innovative Computing, Information and Control, vol. 3, no. 6, pp. 1379-1387, 2007.
[5] C.-C. Chang, Y.-H. Fan, W.-L. Tai, "Four-scanning Attack on Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery," Pattern Recognition, Vol.41, No.2, pp. 654- 661, 2008.
[6] T.-Y. Lee and S. D. Lin, "Dual watermark for tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008.
[7] H. He, F. Chen, H.-M. Tai, T. Kalker, and J. Zhang, "Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme," IEEE Trans. Information Forensics and Security, vol. 7, no. 1, pp.185-196, 2012.
[8] M. S. Wang and W. C. Chen, "A majority-voting based watermarking scheme for color image tamper detection and recovery," Computer Standards & Interfaces, vol. 29, pp. 561-571, 2007.
[9] H. Mirza, H. Thai, and Z. Nakao, "Color image watermarking and self-recovery based on independent component analysis," Lecture Notes in Computer Science, vol. 5097, pp. 839-849, 2008.
[10] N. Wang and C.-H. Kim, "Color image of tamper detection and recovery using block-based watermarking,"in Proc. Int. Conf. Embedded and Multimedia Computing, 2009, pp. 1-6.
[11] N. Wang and C.-H. Kim, "Tamper detection and self-recovery algorithm of color image based on robust embedding of dual visual watermarks using DWT-SVD,"in Proc. Int. Symp. Communications and Information Technology, 2009, pp. 157-162.
[12] M. Iwata, T. Hori, A. Shiozaki, and A. Ogihara, "Digital watermarking method for tamper detection and recovery of JPEG images,"in Proc. Int. Symp. Information Theory and its Applications, 2010, pp. 309-314.
[13] Z. Qian, G. Feng, and Y. Ren, "Fragile watermarking for color image recovery based on color filter array interpolation,"Lecture Notes in Computer Science, vol. 6184, pp. 537-543, 2010.
[14] W.-H. Tsai, "Moment-preserving thresholding: A new approach,"Computer Vision Graphics, and Image Processing, vol. 29, pp. 377-393, 1985.
[15] S.-C. Pei and C.-M. Cheng, "Color image processing by using binary quaternion-moment-preserving thresholding technique," IEEE Trans. Image Processing, vol. 8, no. 5, pp.614-628, 1999.