Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities

被引:47
作者
Bravo-Solorio, Sergio [1 ]
Nandi, Asoke K. [1 ]
机构
[1] Univ Liverpool, Dept Elect Engn & Elect, Liverpool L69 3GJ, Merseyside, England
关键词
Fragile watermarking; Tampering localisation; Self-recovery; Security; SCHEME;
D O I
10.1016/j.sigpro.2010.07.019
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we present a new fragile watermarking method aimed at providing improved tampering localisation and self-recovery capabilities. First, a secure block-wise mechanism, resilient to cropping, is used to localise distorted blocks of pixels. Subsequently, the tampering localisation accuracy is refined by means of an iterative pixel-wise mechanism, which estimates the original watermarked pixels in altered regions. Extensive tests, using a large data-set, are presented to show to what extent the size of the tampered area influences the performance of our method. Moreover, results show that the proposed scheme compares favourably with a method presented in recent literature, in terms of tampering localisation and self-recovery performance. In fact, we show that our method is capable of partially reconstructing a cover image when 5% of its total number of pixels has been cropped. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:728 / 739
页数:12
相关论文
共 19 条
[1]  
[Anonymous], 2002, FIPS PUB and FIPS, V180-2, P180
[2]   Toward secure public-key blockwise fragile authentication watermarking [J].
Barreto, PSLM ;
Kim, HY ;
Rijmen, V .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02) :57-62
[3]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[4]  
Cox IJ, 2008, MKS MULTIMED INFORM, P1
[5]   Security of fragile authentication watermarks with localization [J].
Fridrich, J .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :691-700
[6]  
Griffin G., 2007, Caltech-256 object category dataset
[7]   Adjacent-block based statistical detection method for self-embedding watermarking techniques [J].
He, Hong-Jie ;
Zhang, Jia-Shu ;
Chen, Fan .
SIGNAL PROCESSING, 2009, 89 (08) :1557-1566
[8]   A self-recovery fragile watermarking scheme for image authentication with superior localization [J].
He HongJie ;
Zhang JiaShu ;
Chen Fan .
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (10) :1487-1507
[9]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[10]   Dual watermark for image tamper detection and recovery [J].
Lee, Tien-You ;
Lin, Shinfeng D. .
PATTERN RECOGNITION, 2008, 41 (11) :3497-3506