A block-based watermarking scheme for image tamper detection and self-recovery

2013 ◽  
Vol 21 (2) ◽  
Author(s):  
Y. Chang ◽  
W. Tai

AbstractIn this paper, we present an effective block-based digital fragile watermarking scheme for image tamper detection and recovery. The proposed scheme embeds watermarks consisting of the authentication data and the recovery data into image blocks. It adopts parity check and the intensity-relation check to thwart various malicious attacks. In the tamper detection process, instead of independently testing the embedded authentication data of each block, we take the block-neighbourhood into account and utilize a hierarchical structure to determine the legitimacy of image blocks. Experimental results show that the proposed scheme can effectively resist collage attack, vector quantization (VQ) attack and constant-average attack, while sustaining superior accuracy of tamper localization. Furthermore, the results reveal that the tampered images can be successfully self-recovered with acceptable visual quality.

2015 ◽  
Vol 7 (3) ◽  
pp. 60-80 ◽  
Author(s):  
Nana Wang ◽  
Xiangjun Zhao ◽  
Han Zhang

In this paper, the authors propose a block-based reversible watermarking method for 2D vector map authentication. In the scheme, they divide the features of a vector map into different categories of blocks, calculate an authentication watermark for each block, and embed the watermarks of different blocks using a reversible watermarking method based on virtual coordinates and a fragile watermarking algorithm based on concentric circles. While the block division ensures superior accuracy of tamper localization, the two watermarking methods provide recovery of the original content. Experimental results show that the proposed scheme has good invisibility, reversibility and computational complexity, and can accurately locate malicious attacks such as vertex modification/addition/deletion and feature modification/addition/deletion.


2013 ◽  
Vol 325-326 ◽  
pp. 1555-1558
Author(s):  
Jun Peng Zhang ◽  
Qing Fan Zhang ◽  
Xiu Ying Xie

In this paper, an effective self-embedding fragile watermarking scheme is proposed. The watermark is generated by encoding the DCT coefficients of each 2×2 block and embedded into another block. A non-linear pseudo random sequence is used for generating the block mapping which can enhance the security of the algorithm. An improved tamper localization and recovery algorithm are performed. The experiment results show that the tamper region can be successfully localized and exactly recovered, even if under the content-only tampering.


2021 ◽  
pp. 749-757
Author(s):  
Shambhu Shankar Bharti ◽  
Shivendra Shivani ◽  
Sudhir Kumar Pandey ◽  
Suneeta Agarwal

2018 ◽  
Vol 5 (2) ◽  
pp. 69-94
Author(s):  
K R Chetan ◽  
S Nirmala

A novel adaptive semi-fragile watermarking scheme for tamper detection and recovery of digital images is proposed in this paper. This scheme involves embedding of content and chroma watermarks generated from the first level Discrete Curvelet Transform (DCLT) coarse coefficients. Embedding is performed by quantizing the first level coarse DCLT coefficients of the input image and amount of quantization is intelligently decided based on the energy contribution of the coefficients. During watermark extraction, a tampered matrix is generated by comparing the feature similarity index value between each block of extracted and generated watermarks. The tampered objects are subsequently identified and an intelligent report is formed based on their severity classes. The recovery of the tampered objects is performed using the generated DCLT coefficients from luminance and chrominance components of the watermarked image. Results reveal that the proposed method outperforms existing method in terms of tamper detection and recovery of digital images.


2014 ◽  
Vol 6 (2) ◽  
pp. 1-22
Author(s):  
Lin Gao ◽  
Tiegang Gao

A novel medical image tamper detection and recovery scheme based on Least Significant Bit (LSB) embedding and Piecewise Linear Chaotic Map (PWLCM) is proposed in the paper. To meet the demand of medical usage, the proposed scheme not only improved the precision of detection compared with block-wise scheme of watermark embedding, but also guaranteed the security of the scheme by applying PWLCM. To evaluate the proposed scheme, a former scheme proposed by Xiao et al is used for comparison; the two scheme's visual quality, accuracy of detection, recovery quality and security are tested during the experiment. The experimental results suggest that the proposed scheme meets the demand of visual quality and security for using in medical image tamper detection and recovery.


Author(s):  
Xi Zhao ◽  
Anthony T.S. Ho

With the tremendous growth and use of digital cameras and video devices, the need to verify the collected digital content for law enforcement applications such as crime scene investigations and traffic violations, becomes paramount if they are to be used as evidence in courts. Semi-fragile watermarking has become increasingly important within the past few years as it can be used to verify the content of images by accurately localising the tampered area and tolerating some non-malicious manipulations. There have been a number of different transforms used for semi-fragile image watermarking. In this chapter, we present two novel transforms for semi-fragile watermarking, using the Slant transform (SLT) as a block-based algorithm and the wavelet-based contourlet transform (WBCT) as a non-block based algorithm. The proposed SLT is compared with existing DCT and PST semi-fragile watermarking schemes. Experimental results using standard test images and simulated law enforcement images indicate that the SLT is more accurate for copy and paste attacks with non-malicious manipulations, such as additive Gaussian noise. For the proposed WBCT method, watermarking embedding is performed by modulating the parent-children relationship in the contourlet domain. Again, experimental results using the same test images have demonstrated that our proposed WBCT method achieves good performances in localising the tampered regions, even when the image has been subjected to non-malicious manipulations such as JPEG/JPEG2000 compressions, Gaussian noise, Gaussian filtering, and contrast stretching. The average miss detection rate is found to be approximately 1% while maintaining an average false alarm rate below 6.5%.


Sign in / Sign up

Export Citation Format

Share Document