A Novel Self-Embedding Watermarking Scheme for Image Tamper Detection and Recovery

Article Preview

Abstract:

In this paper, an effective self-embedding fragile watermarking scheme is proposed. The watermark is generated by encoding the DCT coefficients of each 2×2 block and embedded into another block. A non-linear pseudo random sequence is used for generating the block mapping which can enhance the security of the algorithm. An improved tamper localization and recovery algorithm are performed. The experiment results show that the tamper region can be successfully localized and exactly recovered, even if under the content-only tampering.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1555-1558

Citation:

Online since:

June 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] N.Ghoshal, J.K. Mandal: A Novel Technique for Image Authentication in Frequency Domain using DFT Technique. Malaysian Journal of Computer Science 21(1), 24–32 (2008).

DOI: 10.22452/mjcs.vol21no1.3

Google Scholar

[2] P.W. Wong, N.Memon: Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Process.10 (2001) 1593–1601.

DOI: 10.1109/83.951543

Google Scholar

[3] S.Radharani, M.L. Valarmathi: A Study on Watermarking Schemes for Image Authentication. International Journal of Computer Applications ,Volume 2 , June 2010.

DOI: 10.5120/658-925

Google Scholar

[4] C.C. Chang, Y.S. Hu, T.C. Lu, A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Letters 27 (2006) 439–446.

DOI: 10.1016/j.patrec.2005.09.006

Google Scholar

[5] Zhe Guorui,Fengnxing Qian: Image self-embedding with high-quality restoration capability, Digital Signal Processing 21 (2011) 278–286.

DOI: 10.1016/j.dsp.2010.04.006

Google Scholar

[6] X. Zhang and S. Wang: Fragile watermarking with error-free restoration capability, IEEE Trans. Multimedia, 10(8) (2008) 1490-1499.

DOI: 10.1109/tmm.2008.2007334

Google Scholar

[7] Tien-You,Lee, Shinfeng,Lin: Dual watermark for image tamper detection and recovery, Pattern Recognition 41, 3497–3506 (2008).

DOI: 10.1016/j.patcog.2008.05.003

Google Scholar