SVD based fragile watermarking scheme for tamper localization and self-recovery

被引:81
作者
Ansari, Irshad Ahmad [1 ]
Pant, Millie [1 ]
Ahn, Chang Wook [2 ]
机构
[1] Indian Inst Technol, Dept ASE, Roorkee, Uttar Pradesh, India
[2] Sungkyunkwan Univ, Dept CSE, Suwon, South Korea
关键词
Fragile watermarking; Tamper localization; Self-recovery; Singular value decomposition; Detection rate; IMAGE AUTHENTICATION; OWNERSHIP;
D O I
10.1007/s13042-015-0455-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a novel fragile watermarking approach for digital image tamper localization (TL) along with the self-recovery (SR) capability. The host image is first divided into blocks of size 4 x 4 and then, singular value decomposition is performed on each block. The trace of singular matrix is used to compute the TL bits for each block. These 4 x 4 blocks are further divided into blocks of size 2 x 2 to compute the SR information. This SR information is also used for 2nd level of tamper detection in order to enhance the resolution of TL. Proposed scheme implements a self-embedding of TL bits and mapped embedding of SR bits and for that, block mapping is performed. The encrypted combination of both the codes (TL of parent block + SR of mapped block) is inserted in the 1st and 2nd least significant bits of the parent block. Encryption of watermark bits (unique for each watermarked image) helps it to sustain the block based attacks (vector quantization, collage and four scanning attack). Whereas; two level of authentication helps it to sustain content only and constant average attack. The scheme provides an average detection rate of more than 99.5 % and average recovery of 28 dB for a 50 % tampering. The proposed scheme shows a superior performance, when it is compared with the earlier proposed schemes.
引用
收藏
页码:1225 / 1239
页数:15
相关论文
共 31 条
[1]   A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition [J].
Agoyi, Mary ;
Celebi, Erbug ;
Anbarjafari, Gholamreza .
SIGNAL IMAGE AND VIDEO PROCESSING, 2015, 9 (03) :735-745
[2]  
[Anonymous], P 4 INT C SOFT COMP
[3]  
[Anonymous], 2014, P IEEE 80 VEH TECHN
[4]  
[Anonymous], 1999, PICS
[5]   Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities [J].
Bravo-Solorio, Sergio ;
Nandi, Asoke K. .
SIGNAL PROCESSING, 2011, 91 (04) :728-739
[6]   A watermarking-based image ownership and tampering authentication scheme [J].
Chang, CC ;
Hu, YS ;
Lu, TC .
PATTERN RECOGNITION LETTERS, 2006, 27 (05) :439-446
[7]   Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery [J].
Chang, Chin-Chen ;
Fan, Yi-Hsuan ;
Tai, Wei-Liang .
PATTERN RECOGNITION, 2008, 41 (02) :654-661
[8]   A fuzzy c-means clustering-based fragile watermarking scheme for image authentication [J].
Chen, Wei-Che ;
Wang, Ming-Shi .
EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (02) :1300-1307
[9]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[10]  
Huang SC, 2012, J MAR SCI TECH-TAIW, V20, P49