A hierarchical digital watermarking method for image tamper detection and recovery

被引:240
作者
Lin, PL [1 ]
Hsieh, CK
Huang, PW
机构
[1] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 433, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci, Taichung 40227, Taiwan
关键词
image authentication; tamper detection; tamper localization; digital watermarking;
D O I
10.1016/j.patcog.2005.02.007
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present an efficient and effective digital watermarking method for image tamper detection and recovery. Our method is efficient as it only uses simple operations such as parity check and comparison between average intensities. It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be ensured. That is, if a tampered block is not detected in level-1 inspection, it will be detected in level-2 or level-3 inspection with a probability of nearly 1. Our method is also very storage effective, as it only requires a secret key and a public chaotic mixing algorithm to recover a tampered image. The experimental results demonstrate that the precision of tamper detection and localization is 99.6% and 100% after level-2 and level-3 inspection, respectively. The tamper recovery rate is better than 93% for a less than half tampered image. As compared with the method in Celik et al. [IEEE Trans. Image Process. 11(6) (2002) 585], our method is not only as simple and as effective in tamper detection and localization, it also provides with the capability of tamper recovery by trading off the quality of the watermarked images about 5 dB. (c) 2005 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:2519 / 2529
页数:11
相关论文
共 28 条
[1]  
[Anonymous], MULTIMEDIA 00
[2]  
Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
[3]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[4]   Fragile imperceptible digital watermark with privacy control [J].
Coppersmith, D ;
Mintzer, F ;
Tresser, C ;
Wu, CW ;
Yeung, MM .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :79-84
[5]   Watermarking as communications with side information [J].
Cox, IJ ;
Miller, ML ;
McKellips, AL .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1127-1141
[6]   Invisibility and application functionalities in perceptual watermarking - An overview [J].
De Vleeschouwer, C ;
Delaigle, JF ;
Macq, B .
PROCEEDINGS OF THE IEEE, 2002, 90 (01) :64-77
[7]  
Dittmann J, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 2, P209, DOI 10.1109/MMCS.1999.778274
[8]  
Eggers JJ, 2001, INT CONF ACOUST SPEE, P1977, DOI 10.1109/ICASSP.2001.941335
[9]  
Fridrich J, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P404, DOI 10.1109/ICIP.1998.723401
[10]  
FRIDRICH J, 2000, P IEEE INT C IM PROC, P10