Skip to main content

Efficient Self-embedding Data Hiding for Image Integrity Verification with Pixel-Wise Recovery Capability

  • Conference paper
  • First Online:
Image and Video Technology (PSIVT 2019)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 11854))

Included in the following conference series:

Abstract

Due to the powerful image editing tools, image integrity protection is becoming important, for instance, in a court of law, news reports, insurance claims or telemedicine. Digital image watermarking is a technique for detecting, localizing and recovering of tampered image but capability and accuracy of performance by the existing methods are still issues especially when tampering rate is relatively high. This paper proposes a novel blind fragile watermarking mechanism for effective image authentication and recovery. In the proposed scheme, not only the probability of detection and localization of tampering is increased because of embedding appropriate authentication code in the proper position but also there is an efficient post-processing of recovery in a way that any pixel has treated differently leading to higher quality of recovered image. Furthermore, embedding more fragile authentication code with a smaller number of bits can help to provide a second opportunity for content recovery while the quality of watermarked image is preserved. Thus, better results have been achieved in terms of accuracy of detection and the quality of recovered image after higher tampering rate compared with some of the state-of-the-art schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu, X.-L., Lin, C.-C., Yuan, S.-M.: Blind dual watermarking for color images’ authentication and copyright protection. IEEE Trans. Circ. Syst. Video Technol. 28(5), 1047–1055 (2018)

    Article  Google Scholar 

  2. Wang, N., Cheng, X., Li, Z., Chen, Y.: Dual watermarking algorithm based on singular value decomposition and compressive sensing. In: IEEE 17th International Conference on Communication Technology (ICCT), pp. 1763–1767 (2017)

    Google Scholar 

  3. Qin, C., Ji, P., Zhang, X., Dong, J., Wang, J.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Sig. Process. 138, 280–293 (2017)

    Article  Google Scholar 

  4. Dole, V.S., Patil, N.N.: Self-embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: IEEE International Conference on Computing Communication Control and Automation, (ICCUBEA) (2015)

    Google Scholar 

  5. Sing, D., Sing, S.K.: Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. J. Vis. Commun. Image Represent. 38, 775–789 (2016)

    Article  Google Scholar 

  6. Shehab, M., et al.: Secure and robust fragile watermarking scheme for medical images. IEEE Access 6, 10269–10278 (2018)

    Article  Google Scholar 

  7. Hsu, C.-S., Tu, S.-F.: Image tamper detection and recovery using adaptive embedding rules. Measurement 88, 287–296 (2016)

    Article  Google Scholar 

  8. Haghighi, B.B., Taherinia, A.H.: TRLH: fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and half toning technique. J. Vis. Commun. Image Represent. 50, 49–64 (2018)

    Article  Google Scholar 

  9. Tai, W.L., Liao, Z.J.: Image self-recovery with watermark self-embedding. In: IEEE International Conference on Signal Processing, Signal Processing: Image Communication, vol. 65, pp. 11–25, July 2018

    Google Scholar 

  10. Kim, C., Shin, D., Yang, C.-N.: Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers. Ubiquit. Comput. 22(1), 11–22 (2018)

    Article  Google Scholar 

  11. Qin, C., Ji, P., Chang, C.-C., Dong, J., Sun, X.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimedia 25, 36–48 (2018)

    Article  Google Scholar 

  12. Rakhmawati, L., Wirawan, W., Suwadi, S.: A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability. EURASIP J. Image Video Process. 2019, 1–22 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manoranjan Paul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tohidi, F., Paul, M., Hooshmandasl, M.R., Debnath, T., Jamshidi, H. (2019). Efficient Self-embedding Data Hiding for Image Integrity Verification with Pixel-Wise Recovery Capability. In: Lee, C., Su, Z., Sugimoto, A. (eds) Image and Video Technology. PSIVT 2019. Lecture Notes in Computer Science(), vol 11854. Springer, Cham. https://doi.org/10.1007/978-3-030-34879-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34879-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34878-6

  • Online ISBN: 978-3-030-34879-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics