Abstract
In the past few years, semi-fragile watermarking has become increasingly important to verify the content of images and localise the tampered areas, while tolerating some non-malicious manipulations. Moreover, some researchers proposed self-restoration schemes to recover the tampered area in semi-fragile watermarking schemes. In this paper, we propose a novel fast self-restoration scheme resisting to JPEG compression for semi-fragile watermarking. In the watermark embedding process, we embed ten watermarks (six for authentication and four for self-restoration) into each 8 ×8 block of the original image. We then utilise four (4 ×4) sub-blocks’ mean pixel values (extracted watermarks) to restore its corresponding (8 ×8) block’s first four DCT coefficients for image content recovering. We compare our results with Li et al. and Chamlawi et al. DCT related schemes. The PSNR results indicate that the imperceptibility of our watermarked image is high at 37.61 dB and approximately 4 dB greater than the other two schemes. Moreover, the restored image is at 24.71 dB, approximately 2 dB higher than other two methods on average. Our restored image also achieves 24.39 dB, 22.98 dB 21.18 dB and 19.98 dB after JPEG compression QF =95, 85, 75 and 65, respectively, which are approximately 2.5 dB higher than other two self-restoration methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Li, C.T., Si, H.: Wavelet-based Fragile Watermarking Scheme for Image Authentication. Journal of Electronic Imaging 16, 013009-1–013009-9 (2007)
He, H.J., Zhang, J.S., Chen, F.: Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Processing 89(8), 1557–1566 (2009)
Li, C.T., Yuan, Y.: Digital Watermarking Scheme Exploiting Non-deterministic Dependence for Image Authentication. Optical Engineering 45(12), 127001-1–127001-6 (2006)
Ho, A.T.S., Zhu, X., Guan, Y.: Image content authentication using pinned sine transform. EURASIP Journal on Applied Signal Processing 2004, 2174–2184 (2004)
Qi, X.J., Xin, X.: A quantization-based semi-fragile watermarking scheme for image content authentication. Journal of Visual Communication and Image Representation 22(2), 187–200 (2011)
Lin, C.H., Su, T.S., Hsieh, W.S.: Semi-fragile watermarking Scheme for authentication of JPEG Images. Tamkang Journal of Science and Engineering 10(1), 57–66 (2007)
Lin, H.Y.S., Liao, H.Y.M., Lu, C.S., Lin, J.C.: Fragile watermarking for authenticating 3-D polygonal meshes. IEEE Trans. Multimedia 7(6), 997–1006 (2005)
Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: IEEE International Conference on Image Processing, vol. 3, pp. 792–796 (1999)
Zhao, X., Ho, A.T.S., Treharne, H., Pankajakshan, V., Culnane, C., Jiang, W.: A Novel Semi-Fragile Image Watermarking, Authentication and Self-restoration Technique Using the Slant Transform. In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), vol. 1, pp. 26–28 (2007)
Hasan, Y.M.Y., Hassan, A.M.: Tamper Detection with Self Correction on Hybrid Spatial-DCT Domains Image Authentication Technique. In: IEEE International Symposium on Signal Processing and Information Technology, pp. 369–374 (2007)
Cruz, C., Mendoza, J.A., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Semi-Fragile Watermarking based Image Authentication with Recovery Capability. In: IEEE International Conference on Information Engineering and Computer Science (ICIECS 2009), pp. 1–4 (2009)
Li, G., Pei, S., Chen, G., Cao, W., Wu, B.: A Self-embedded Watermarking Scheme Based on Relationship Function of Corresponding Inter-blocks DCT Coefficient. In: 13th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2009), pp. 107–112 (2009)
Chamlawi, R., Khan, A., Idris, A.: Wavelet based image authentication and recovery. Journal of Computer Science and Technology 22(6), 795–804 (2007)
Lin, C.Y., Chang, S.F.: Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: SPIE Security and Watermarking of Multimedia Contents II EI 2000, pp. 140–151 (2000)
Mendoza-Noriega, J., Kurkoski, B., Nakano-Miyatake, M., Perez-Meana, H.: Halftoning-based Self-embedding Watermarking for Image Authentication and Recovery. In: IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), pp. 612–615 (2010)
Chen, B., Wornell, G.: Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. On Information Theory 48(4), 1423–1444 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, H., Ho, A.T.S., Zhao, X. (2012). A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-32205-1_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32204-4
Online ISBN: 978-3-642-32205-1
eBook Packages: Computer ScienceComputer Science (R0)