Adjacent-block based statistical detection method for self-embedding watermarking techniques

被引:74
作者
He, Hong-Jie [1 ]
Zhang, Jia-Shu [1 ]
Chen, Fan [2 ]
机构
[1] SW Jiaotong Univ, Sichuan Key Lab Signal & Informat Proc, Chengdu 610031, Peoples R China
[2] SW Jiaotong Univ, Informat Secur & Natl Comp Grid Lab, Chengdu 610031, Peoples R China
基金
美国国家科学基金会;
关键词
Fragile watermarking; Self-embedding; Statistical detection method (SDM); Adjacent-block; IMAGE TAMPER DETECTION; RECOVERY; AUTHENTICATION; LOCALIZATION; SCHEMES;
D O I
10.1016/j.sigpro.2009.02.009
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes an adjacent-block based statistical detection method for self-embedding watermarking techniques to accurately identify the tampered blocks, and gives an analytical analysis of the tamper detection performance. in the proposed statistical detection method, we take all adjacent blocks of the test block and its mapping block into account and then utilize a statistic-based rule to verify the validity of image blocks. Analytical analysis and experimental results demonstrate that the proposed statistical detection method can identify the tampered blocks with a probability more than 98% even the tampered area is up to 70% of the host image. In addition, the proposed method outperforms conventional self-embedding fragile watermarking algorithms in tamper detection under collage attack and content-tampering attack. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1557 / 1566
页数:10
相关论文
共 18 条
[1]  
[Anonymous], S CONT SEC DAT HID D
[2]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[3]   Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery [J].
Chang, Chin-Chen ;
Fan, Yi-Hsuan ;
Tai, Wei-Liang .
PATTERN RECOGNITION, 2008, 41 (02) :654-661
[4]   Cryptanalysis of the Yeung-Mintzer fragile watermarking technique [J].
Fridrich, J ;
Goljan, M ;
Memon, N .
JOURNAL OF ELECTRONIC IMAGING, 2002, 11 (02) :262-274
[5]  
Fridrich J., 1999, P IEEE INT C IM PROC, P792, DOI DOI 10.1109/ICIP.1999.817228
[6]  
HE HJ, 2006, P 5 INT WORKSH DIG W, V11, P422
[7]  
He HJ, 2006, INT J COMPUT SCI NET, V6, P251
[8]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[9]  
KOSTOPOULOS I, 2002, P 14 INT C DIG SIGN, V7, P733
[10]   Dual watermark for image tamper detection and recovery [J].
Lee, Tien-You ;
Lin, Shinfeng D. .
PATTERN RECOGNITION, 2008, 41 (11) :3497-3506