Efficient Self-embedding Data Hiding for Image Integrity Verification with Pixel-Wise Recovery Capability
Due to the powerful image editing tools, image integrity protection is becoming important, for instance, in a court of law, news reports, insurance claims or telemedicine. Digital image watermarking is a technique for detecting, localizing and recovering of tampered image but capability and accuracy of performance by the existing methods are still issues especially when tampering rate is relatively high. This paper proposes a novel blind fragile watermarking mechanism for effective image authentication and recovery. In the proposed scheme, not only the probability of detection and localization of tampering is increased because of embedding appropriate authentication code in the proper position but also there is an efficient post-processing of recovery in a way that any pixel has treated differently leading to higher quality of recovered image. Furthermore, embedding more fragile authentication code with a smaller number of bits can help to provide a second opportunity for content recovery while the quality of watermarked image is preserved. Thus, better results have been achieved in terms of accuracy of detection and the quality of recovered image after higher tampering rate compared with some of the state-of-the-art schemes.
KeywordsWatermarking Tamper detection Image recovery Image security Image authentication
- 2.Wang, N., Cheng, X., Li, Z., Chen, Y.: Dual watermarking algorithm based on singular value decomposition and compressive sensing. In: IEEE 17th International Conference on Communication Technology (ICCT), pp. 1763–1767 (2017)Google Scholar
- 4.Dole, V.S., Patil, N.N.: Self-embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks. In: IEEE International Conference on Computing Communication Control and Automation, (ICCUBEA) (2015)Google Scholar
- 9.Tai, W.L., Liao, Z.J.: Image self-recovery with watermark self-embedding. In: IEEE International Conference on Signal Processing, Signal Processing: Image Communication, vol. 65, pp. 11–25, July 2018Google Scholar