Abstract
Reference-sharing based self-embedding watermarking schemes had been shown to be an effective way to avoid the tampering coincidence and the reference waste problems. Typical reference-sharing based schemes adopt pseudo-random binary matrices as the encoding matrices to generate the reference information. This paper investigate to reduce the computational complexity of the reference-sharing based self-embedding watermarking approach by using the sparse binary matrices as the encoding matrices. Experimental results demonstrate the proposed approach can reduce the computational complexity significantly while maintaining the same tampering restoration capability as the traditional.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: International Conference on Image Processing, ICIP 1999 Proceedings, vol. 3, pp. 792-796. IEEE (1999)
Dadkhah, S., Abd Manaf, A., Hori, Y., Ella Hassanien, A., Sadeghi, S.: An effective SVD-based image tampering detection and self-recovery using active watermarking. Sig. Process. Image Commun. 29(10), 1197–1210 (2014)
Zhang, X., Xiao, Y., Zhao, Z.: Self-Embedding Fragile Watermarking Based on DCT and Fast Fractal Coding. Kluwer Academic Publishers, Hingham (2015)
Qin, C., Chang, C.C., Chen, P.Y.: Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Sig. Process. 92(4), 1137–1150 (2012)
He, H., Chen, F., Tai, H.M., Kalker, T., Zhang, J.: Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans. Inf. Forensics Secur. 7(1), 185–196 (2012)
Singh, D., Singh, S.K.: Effective Self-Embedding Watermarking Scheme for Image Tampered Detection and Localization with Recovery Capability. Academic Press, Inc., Orlando (2016)
Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223–1232 (2011)
Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)
Li, C., Wang, Y., Ma, B., Zhang, Z.: A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. Comput. Electr. Eng. 37(6), 927–940 (2011)
Zhang, X., Wang, S., Qian, Z., Feng, G.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485–495 (2011)
Zhang, X., Wang, S.: Fragile watermarking with error-free restoration capability. IEEE Trans. Multimed. 10(8), 1490–1499 (2008)
Zhang, X., Wang, S.: Fast communication: fragile watermarking scheme using a hierarchical mechanism. Sig. Process. 89(4), 675–679 (2009)
Qin, C., Wang, H., Zhang, X., Sun, X.: Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf. Sci. 373, 233–250 (2016)
Qin, C., Ji, P., Wang, J., Chang, C.C.: Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed. Tools Appl. 76(2), 2267–2287 (2017)
Qin, C., Ji, P., Zhang, X., Dong, J., Wang, J.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138(C), 280–293 (2017)
Cao, F., An, B., Wang, J., Ye, D., Wang, H.: Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46, 52–60 (2017)
Korus, P., Dziech, A.: Efficient method for content reconstruction with self-embedding. IEEE Trans. Image Process. Publ. IEEE Signal. Process. Soc. 22(3), 1134 (2013)
Acknowledgment
This research is supported in part by the National Natural Science Foundation of China (NSFC) (No. U1536110).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Niu, D., Wang, H., Cheng, M. (2018). Reducing the Computational Complexity of the Reference-Sharing Based Self-embedding Watermarking Approach. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11068. Springer, Cham. https://doi.org/10.1007/978-3-030-00021-9_56
Download citation
DOI: https://doi.org/10.1007/978-3-030-00021-9_56
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00020-2
Online ISBN: 978-3-030-00021-9
eBook Packages: Computer ScienceComputer Science (R0)