Skip to main content

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

  • Conference paper
Digital Forensics and Watermarking (IWDW 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7128))

Included in the following conference series:

Abstract

In the past few years, semi-fragile watermarking has become increasingly important to verify the content of images and localise the tampered areas, while tolerating some non-malicious manipulations. Moreover, some researchers proposed self-restoration schemes to recover the tampered area in semi-fragile watermarking schemes. In this paper, we propose a novel fast self-restoration scheme resisting to JPEG compression for semi-fragile watermarking. In the watermark embedding process, we embed ten watermarks (six for authentication and four for self-restoration) into each 8 ×8 block of the original image. We then utilise four (4 ×4) sub-blocks’ mean pixel values (extracted watermarks) to restore its corresponding (8 ×8) block’s first four DCT coefficients for image content recovering. We compare our results with Li et al. and Chamlawi et al. DCT related schemes. The PSNR results indicate that the imperceptibility of our watermarked image is high at 37.61 dB and approximately 4 dB greater than the other two schemes. Moreover, the restored image is at 24.71 dB, approximately 2 dB higher than other two methods on average. Our restored image also achieves 24.39 dB, 22.98 dB 21.18 dB and 19.98 dB after JPEG compression QF =95, 85, 75 and 65, respectively, which are approximately 2.5 dB higher than other two self-restoration methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, C.T., Si, H.: Wavelet-based Fragile Watermarking Scheme for Image Authentication. Journal of Electronic Imaging 16, 013009-1–013009-9 (2007)

    Google Scholar 

  2. He, H.J., Zhang, J.S., Chen, F.: Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Processing 89(8), 1557–1566 (2009)

    Article  MATH  Google Scholar 

  3. Li, C.T., Yuan, Y.: Digital Watermarking Scheme Exploiting Non-deterministic Dependence for Image Authentication. Optical Engineering 45(12), 127001-1–127001-6 (2006)

    Google Scholar 

  4. Ho, A.T.S., Zhu, X., Guan, Y.: Image content authentication using pinned sine transform. EURASIP Journal on Applied Signal Processing 2004, 2174–2184 (2004)

    Article  Google Scholar 

  5. Qi, X.J., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. Journal of Visual Communication and Image Representation 22(2), 187–200 (2011)

    Article  Google Scholar 

  6. Lin, C.H., Su, T.S., Hsieh, W.S.: Semi-fragile watermarking Scheme for authentication of JPEG Images. Tamkang Journal of Science and Engineering 10(1), 57–66 (2007)

    Google Scholar 

  7. Lin, H.Y.S., Liao, H.Y.M., Lu, C.S., Lin, J.C.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia 7(6), 997–1006 (2005)

    Article  Google Scholar 

  8. Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: IEEE International Conference on Image Processing, vol. 3, pp. 792–796 (1999)

    Google Scholar 

  9. Zhao, X., Ho, A.T.S., Treharne, H., Pankajakshan, V., Culnane, C., Jiang, W.: A Novel Semi-Fragile Image Watermarking, Authentication and Self-restoration Technique Using the Slant Transform. In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), vol. 1, pp. 26–28 (2007)

    Google Scholar 

  10. Hasan, Y.M.Y., Hassan, A.M.: Tamper Detection with Self Correction on Hybrid Spatial-DCT Domains Image Authentication Technique. In: IEEE International Symposium on Signal Processing and Information Technology, pp. 369–374 (2007)

    Google Scholar 

  11. Cruz, C., Mendoza, J.A., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Semi-Fragile Watermarking based Image Authentication with Recovery Capability. In: IEEE International Conference on Information Engineering and Computer Science (ICIECS 2009), pp. 1–4 (2009)

    Google Scholar 

  12. Li, G., Pei, S., Chen, G., Cao, W., Wu, B.: A Self-embedded Watermarking Scheme Based on Relationship Function of Corresponding Inter-blocks DCT Coefficient. In: 13th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2009), pp. 107–112 (2009)

    Google Scholar 

  13. Chamlawi, R., Khan, A., Idris, A.: Wavelet based image authentication and recovery. Journal of Computer Science and Technology 22(6), 795–804 (2007)

    Article  Google Scholar 

  14. Lin, C.Y., Chang, S.F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: SPIE Security and Watermarking of Multimedia Contents II EI 2000, pp. 140–151 (2000)

    Google Scholar 

  15. Mendoza-Noriega, J., Kurkoski, B., Nakano-Miyatake, M., Perez-Meana, H.: Halftoning-based Self-embedding Watermarking for Image Authentication and Recovery. In: IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 612–615 (2010)

    Google Scholar 

  16. Chen, B., Wornell, G.: Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. On Information Theory 48(4), 1423–1444 (2001)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, H., Ho, A.T.S., Zhao, X. (2012). A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics