Skip to main content

Reducing the Computational Complexity of the Reference-Sharing Based Self-embedding Watermarking Approach

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11068))

Included in the following conference series:

  • 1476 Accesses

Abstract

Reference-sharing based self-embedding watermarking schemes had been shown to be an effective way to avoid the tampering coincidence and the reference waste problems. Typical reference-sharing based schemes adopt pseudo-random binary matrices as the encoding matrices to generate the reference information. This paper investigate to reduce the computational complexity of the reference-sharing based self-embedding watermarking approach by using the sparse binary matrices as the encoding matrices. Experimental results demonstrate the proposed approach can reduce the computational complexity significantly while maintaining the same tampering restoration capability as the traditional.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: International Conference on Image Processing, ICIP 1999 Proceedings, vol. 3, pp. 792-796. IEEE (1999)

    Google Scholar 

  2. Dadkhah, S., Abd Manaf, A., Hori, Y., Ella Hassanien, A., Sadeghi, S.: An effective SVD-based image tampering detection and self-recovery using active watermarking. Sig. Process. Image Commun. 29(10), 1197–1210 (2014)

    Article  Google Scholar 

  3. Zhang, X., Xiao, Y., Zhao, Z.: Self-Embedding Fragile Watermarking Based on DCT and Fast Fractal Coding. Kluwer Academic Publishers, Hingham (2015)

    Google Scholar 

  4. Qin, C., Chang, C.C., Chen, P.Y.: Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Sig. Process. 92(4), 1137–1150 (2012)

    Article  Google Scholar 

  5. He, H., Chen, F., Tai, H.M., Kalker, T., Zhang, J.: Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans. Inf. Forensics Secur. 7(1), 185–196 (2012)

    Article  Google Scholar 

  6. Singh, D., Singh, S.K.: Effective Self-Embedding Watermarking Scheme for Image Tampered Detection and Localization with Recovery Capability. Academic Press, Inc., Orlando (2016)

    Google Scholar 

  7. Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223–1232 (2011)

    Article  Google Scholar 

  8. Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)

    Article  Google Scholar 

  9. Li, C., Wang, Y., Ma, B., Zhang, Z.: A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. Comput. Electr. Eng. 37(6), 927–940 (2011)

    Article  Google Scholar 

  10. Zhang, X., Wang, S., Qian, Z., Feng, G.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485–495 (2011)

    Article  MathSciNet  Google Scholar 

  11. Zhang, X., Wang, S.: Fragile watermarking with error-free restoration capability. IEEE Trans. Multimed. 10(8), 1490–1499 (2008)

    Article  Google Scholar 

  12. Zhang, X., Wang, S.: Fast communication: fragile watermarking scheme using a hierarchical mechanism. Sig. Process. 89(4), 675–679 (2009)

    Article  Google Scholar 

  13. Qin, C., Wang, H., Zhang, X., Sun, X.: Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf. Sci. 373, 233–250 (2016)

    Article  Google Scholar 

  14. Qin, C., Ji, P., Wang, J., Chang, C.C.: Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed. Tools Appl. 76(2), 2267–2287 (2017)

    Article  Google Scholar 

  15. Qin, C., Ji, P., Zhang, X., Dong, J., Wang, J.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138(C), 280–293 (2017)

    Article  Google Scholar 

  16. Cao, F., An, B., Wang, J., Ye, D., Wang, H.: Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46, 52–60 (2017)

    Article  Google Scholar 

  17. Korus, P., Dziech, A.: Efficient method for content reconstruction with self-embedding. IEEE Trans. Image Process. Publ. IEEE Signal. Process. Soc. 22(3), 1134 (2013)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgment

This research is supported in part by the National Natural Science Foundation of China (NSFC) (No. U1536110).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongxia Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Niu, D., Wang, H., Cheng, M. (2018). Reducing the Computational Complexity of the Reference-Sharing Based Self-embedding Watermarking Approach. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11068. Springer, Cham. https://doi.org/10.1007/978-3-030-00021-9_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00021-9_56

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00020-2

  • Online ISBN: 978-3-030-00021-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics