Reversible Face Watermarking Scheme using Hash Function for Tamper Localization and Recovery

Author(s):  
Kiung Siew Lian ◽  
Liew Siau Chuin ◽  
Ferda Ernawan
2021 ◽  
pp. 749-757
Author(s):  
Shambhu Shankar Bharti ◽  
Shivendra Shivani ◽  
Sudhir Kumar Pandey ◽  
Suneeta Agarwal

The watermarking scheme in digital media communication has become an essential tool in helping content creators prove ownership if any dispute arises in copyright infringement. In this paper, Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is performed in the watermarking process which improves the authentication of the image and the detection of the tampered region. The semi-fragile watermarking scheme provides robustness to the watermark during extraction process even after the unintentional compression attacks like JPEG compression. The watermark payload is significantly lowered in order to increase the quality of the image. The recovery is done using the absolute moment block truncation coding (AMBTC) of the image in the untampered region. Thus, both the mean and first absolute moment are used in recovering the tampered regions in the watermarked image.


2013 ◽  
Vol 325-326 ◽  
pp. 1555-1558
Author(s):  
Jun Peng Zhang ◽  
Qing Fan Zhang ◽  
Xiu Ying Xie

In this paper, an effective self-embedding fragile watermarking scheme is proposed. The watermark is generated by encoding the DCT coefficients of each 2×2 block and embedded into another block. A non-linear pseudo random sequence is used for generating the block mapping which can enhance the security of the algorithm. An improved tamper localization and recovery algorithm are performed. The experiment results show that the tamper region can be successfully localized and exactly recovered, even if under the content-only tampering.


2013 ◽  
Vol 21 (2) ◽  
Author(s):  
Y. Chang ◽  
W. Tai

AbstractIn this paper, we present an effective block-based digital fragile watermarking scheme for image tamper detection and recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. It adopts parity check and the intensity-relation check to thwart various malicious attacks. In the tamper detection process, instead of independently testing the embedded authentication data of each block, we take the block-neighbourhood into account and utilize a hierarchical structure to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively resist collage attack, vector quantization (VQ) attack and constant-average attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully self-recovered with acceptable visual quality.


Sign in / Sign up

Export Citation Format

Share Document