© The Institution of Engineering and Technology
The rapid development of the internet allows digital media being easily delivered, copied and even tampered. The watermarking issue has thus focused mainly on the medium of authentication. In this study, an efficient self-embedding watermarking scheme for colour image authentication is proposed. The scheme is designed to achieve tamper proofing and high-quality recovery. The scheme is efficient because the validity of image blocks is simply proofed by using a dual-option parity-check method and morphological operations. The former is used to generate authentication information for obtaining better results of tamper proofing and the latter is used to further improve the neighbouring connectivity of the proofing results. To achieve high-quality recovery of the tampered image, the feature information of the host colour image and its corresponding block-edge-pattern information are properly organised to embed into three colour components of the host colour image. Meanwhile, the embedding information is appropriately distributed over luminance and chrominance components of the colour image in the YCbCr colour space such that the quality of the watermarked image can be better obtained. The simulation results show that the proposed watermarking scheme can effectively proof the tempered region with high detection rate and can restore the tempered region with high quality.
References
-
-
1)
-
Li, K.-F., Chen, T.-S., Wu, S.-C.: `Image tamper detection and recovery system based on discrete wavelet transform', Proc. IEEE Pacific Rim Conf. on Communications, Computers and Signal Processing, August, 2001, 1, p. 164–167.
-
2)
-
Z. Peng ,
W. Liu
.
Color image authentication based on spatiotemporal chaos and SVD.
Chaos Solitons Fractals
,
4 ,
946 -
952
-
3)
-
Voyatzis, G., Pitas, I.: `Chaotic mixing of digital images and applications to watermarking', Proc. European Conf. on Multimedia Applications Services and Techniques, 1996, p. 687–689.
-
4)
-
C.-K. Yang ,
C.-S. Huang
.
A novel watermarking technique for tampering detection in digital images.
Electron. Lett. Comput. Vis. Image Anal.
,
1 ,
1 -
12
-
5)
-
C.-T. Li ,
H. Si
.
Wavelet-based fragile watermarking scheme for image authentication.
J. Electron. Imaging
,
1 ,
99 -
106
-
6)
-
S.D. Lin ,
Y.-C. Kuo ,
M.-H. Yao
.
An image watermarking scheme with tamper detection and recovery.
Int. J. Innov. Comput., Inf. Control
,
6 ,
1379 -
1387
-
7)
-
Kostopoulos, I., Gilani, S.A.M., Skodras, A.N.: `Colour image authentication based on a self-embedding technique', Proc. Int. Conf. on Digital Signal Processing, 2002, 2, p. 733–736.
-
8)
-
D. Chen ,
A. Bovik
.
Visual pattern image coding.
IEEE Trans Commun.
,
2137 -
2146
-
9)
-
G.-J. Yu ,
C.-S. Lu ,
H.Y.M. Liao
.
Mean quantization-based fragile watermarking for image authentication.
Opt. Eng.
,
7 ,
1396 -
1408
-
10)
-
Wang, N., Kim, C.-H.: `Color image of tamper detection and recovery using block-based watermarking', Proc. Int. Conf. on Embedded and Multimedia Computing, 2009, 1, p. 1–6.
-
11)
-
M. Holliman ,
N. Memon
.
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes.
IEEE Trans, Image Process.
,
432 -
441
-
12)
-
H. Mirza ,
H. Thai ,
Z. Nakao
.
Color image watermarking and self-recovery based on independent component analysis.
Lect. Notes Comput. Sci.
,
839 -
849
-
13)
-
P.-L. Lin ,
C.-K. Hsieh ,
P.-W. Huang
.
A hierarchical digital watermarking method for image tamper detection and recovery.
Pattern Recognit.
,
2519 -
2529
-
14)
-
M.S. Wang ,
W.C. Chen
.
A majority-voting based watermarking scheme for color image tamper detection and recovery.
Comput. Stand. Interfaces
,
561 -
571
-
15)
-
Lin, P.-L., Huang, P.-W., Peng, A.-W.: `A fragile watermarking scheme for image authentication with localization and recovery', Proc. IEEE Int. Symp. on Multimedia Software Engineering, December 2004, p. 146–153.
-
16)
-
Safranek, R.J., Johnston, J.D.: `A perceptually tuned subband image coder with image dependent quantization and post-quantization data compression', Proc. IEEE Int. Conf. on Acoustics, Speech, Signal Processing, 1989, p. 1945–1948.
-
17)
-
D. Kundur ,
D. Hatzinakos
.
Digital watermarking for telltale tamper proofing and authentication.
Proc. IEEE
,
7 ,
1167 -
1180
-
18)
-
C. Gaël ,
C. Dinu ,
T. Alain
.
Watermarking and authentication of color images based on segmentation of the xyY color space.
J. Imag. Sci. Technol.
,
5 ,
411 -
423
-
19)
-
T.-Y. Lee ,
S.D. Lin
.
Dual watermark for tamper detection and recovery.
Pattern Recognit.
,
11 ,
3497 -
3506
-
20)
-
H.-T. Lu ,
R.-M. Shen ,
F.-L. Chung
.
Fragile watermarking scheme for image authentication.
Electron. Lett.
,
12 ,
898 -
900
-
21)
-
Fridrich, J.: `A hybrid watermark for tamper detection in digital images', Proc. Int. Symp. on Signal Processing and its Applications, 1999, 1, p. 301–304.
-
22)
-
Lin, H., Yang, S., Xu, L.: `Watermark algorithm for color image authentication and restoration', Proc. Electronic and Mechanical Engineering and Information Technology, 2011, 1, p. 2773–2776.
-
23)
-
H.-J. He ,
J.-S. Zhang ,
F. Chen
.
Adjacent-block based statistical detection method for self-embedding watermarking techniques.
Signal Process.
,
8 ,
1557 -
1566
-
24)
-
X.K. Yang ,
W.S. Lin ,
Z.K. Lu ,
E.P. Ong ,
S.S. Yao
.
Just noticeable distortion model and its applications in video coding.
Signal Process.: Image Commun.
,
662 -
680
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2011.0574
Related content
content/journals/10.1049/iet-ipr.2011.0574
pub_keyword,iet_inspecKeyword,pub_concept
6
6