Colour image watermarking for tamper proofing and pattern-based recovery

Access Full Text

Colour image watermarking for tamper proofing and pattern-based recovery

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Image Processing — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The rapid development of the internet allows digital media being easily delivered, copied and even tampered. The watermarking issue has thus focused mainly on the medium of authentication. In this study, an efficient self-embedding watermarking scheme for colour image authentication is proposed. The scheme is designed to achieve tamper proofing and high-quality recovery. The scheme is efficient because the validity of image blocks is simply proofed by using a dual-option parity-check method and morphological operations. The former is used to generate authentication information for obtaining better results of tamper proofing and the latter is used to further improve the neighbouring connectivity of the proofing results. To achieve high-quality recovery of the tampered image, the feature information of the host colour image and its corresponding block-edge-pattern information are properly organised to embed into three colour components of the host colour image. Meanwhile, the embedding information is appropriately distributed over luminance and chrominance components of the colour image in the YCbCr colour space such that the quality of the watermarked image can be better obtained. The simulation results show that the proposed watermarking scheme can effectively proof the tempered region with high detection rate and can restore the tempered region with high quality.

Inspec keywords: image watermarking; image coding; image colour analysis

Other keywords: luminance component; Internet; chrominance component; dual-option parity-check method; block-edge-pattern information; tamper proofing; morphological operation; image block validity; high-quality recovery; self-embedding watermarking scheme; colour image authentication information; colour image watermarking; digital media; high-quality pattern-based recovery; feature information

Subjects: Computer vision and image processing techniques; Image and video coding; Data security; Image sensors

References

    1. 1)
      • Li, K.-F., Chen, T.-S., Wu, S.-C.: `Image tamper detection and recovery system based on discrete wavelet transform', Proc. IEEE Pacific Rim Conf. on Communications, Computers and Signal Processing, August, 2001, 1, p. 164–167.
    2. 2)
    3. 3)
      • Voyatzis, G., Pitas, I.: `Chaotic mixing of digital images and applications to watermarking', Proc. European Conf. on Multimedia Applications Services and Techniques, 1996, p. 687–689.
    4. 4)
      • C.-K. Yang , C.-S. Huang . A novel watermarking technique for tampering detection in digital images. Electron. Lett. Comput. Vis. Image Anal. , 1 , 1 - 12
    5. 5)
    6. 6)
    7. 7)
      • Kostopoulos, I., Gilani, S.A.M., Skodras, A.N.: `Colour image authentication based on a self-embedding technique', Proc. Int. Conf. on Digital Signal Processing, 2002, 2, p. 733–736.
    8. 8)
    9. 9)
    10. 10)
      • Wang, N., Kim, C.-H.: `Color image of tamper detection and recovery using block-based watermarking', Proc. Int. Conf. on Embedded and Multimedia Computing, 2009, 1, p. 1–6.
    11. 11)
    12. 12)
    13. 13)
    14. 14)
    15. 15)
      • Lin, P.-L., Huang, P.-W., Peng, A.-W.: `A fragile watermarking scheme for image authentication with localization and recovery', Proc. IEEE Int. Symp. on Multimedia Software Engineering, December 2004, p. 146–153.
    16. 16)
      • Safranek, R.J., Johnston, J.D.: `A perceptually tuned subband image coder with image dependent quantization and post-quantization data compression', Proc. IEEE Int. Conf. on Acoustics, Speech, Signal Processing, 1989, p. 1945–1948.
    17. 17)
    18. 18)
    19. 19)
    20. 20)
    21. 21)
      • Fridrich, J.: `A hybrid watermark for tamper detection in digital images', Proc. Int. Symp. on Signal Processing and its Applications, 1999, 1, p. 301–304.
    22. 22)
      • Lin, H., Yang, S., Xu, L.: `Watermark algorithm for color image authentication and restoration', Proc. Electronic and Mechanical Engineering and Information Technology, 2011, 1, p. 2773–2776.
    23. 23)
    24. 24)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2011.0574
Loading

Related content

content/journals/10.1049/iet-ipr.2011.0574
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading