Dual watermark for image tamper detection and recovery

被引:256
作者
Lee, Tien-You [1 ]
Lin, Shinfeng D. [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Shoufeng 97401, Hualien, Taiwan
关键词
dual watermark; tamper recovery; second chance; partner-block;
D O I
10.1016/j.patcog.2008.05.003
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
An effective dual watermark scheme for image tamper detection and recovery is proposed in this paper. In our algorithm, each block in the image contains watermark of other two blocks. That is to say, there are two copies of watermark for each non-overlapping block in the image. Therefore, we maintain two copies of watermark of the whole image and provide second chance for block recovery in case one copy is destroyed. A secret key, which is transmitted along with the watermarked image, and a public chaotic mixing algorithm are used to extract the watermark For tamper recovery. By using our algorithm, a 90% tampered image can be recovered to a dim yet still recognizable condition (PSNR approximate to 20dB). Experimental results demonstrate that our algorithm is superior to the compared techniques, especially when the tampered area is large. (C) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3497 / 3506
页数:10
相关论文
共 16 条
[1]  
[Anonymous], IEEE 6 INT S MULT SO
[2]   Fragile imperceptible digital watermark with privacy control [J].
Coppersmith, D ;
Mintzer, F ;
Tresser, C ;
Wu, CW ;
Yeung, MM .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :79-84
[3]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[4]  
FRIDRICH J, 1999, P 5 INT S SIGN PROC, V1, P301
[5]   THE TRUSTWORTHY DIGITAL CAMERA - RESTORING CREDIBILITY TO THE PHOTOGRAPHIC IMAGE [J].
FRIEDMAN, GL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 1993, 39 (04) :905-910
[6]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[7]  
LIN CY, 2000, SPIE INT C SEC WAT M, V3971
[8]   A hierarchical digital watermarking method for image tamper detection and recovery [J].
Lin, PL ;
Hsieh, CK ;
Huang, PW .
PATTERN RECOGNITION, 2005, 38 (12) :2519-2529
[9]  
Lu CS, 2000, IEEE T MULTIMEDIA, V2, P209, DOI 10.1109/6046.890056
[10]  
SWANSON MD, 1996, P IEEE DIG SIGN PROC, P37