WAIM 2010: Web-Age Information Management pp 537-543 | Cite as

Fragile Watermarking for Color Image Recovery Based on Color Filter Array Interpolation

  • Zhenxing Qian
  • Guorui Feng
  • Yanli Ren
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6184)

Abstract

In this paper, a novel fragile watermarking method is proposed for color image recovery via color filter array interpolation. First we turn a color image into a grey image by color sampling in the form of Bayer patterns. Data of the grey image which is reordered as reference bits are then embedded into the original image along with some authentication bits generated from the image. After the watermarked image is received, authentication bits are extracted to identify which regions are tampered. When the image is detected to be tampered, extracted reference bits are used to reconstruct a color image by color filter array interpolation, which is then used to recover the content of the tampered regions. Experiments show this method has good recovery ability.

Keywords

Self-recovery fragile watermarking color filter array interpolation steganography 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fridrich, J.: Image watermarking for tamper detection. In: Proceeding of the IEEE International Conference on Image Processing, Chicago, IL, USA, vol. II, pp. 404–408 (1998)Google Scholar
  2. 2.
    Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M.: Hierarchical Watermarking for Secure Image Authentication with Localization. IEEE Transactions on Image Processing 11(6), 585–594 (2002)CrossRefGoogle Scholar
  3. 3.
    Suthaharan, S.: Fragile Image Watermarking Using a Gradient Image for Improved Localization and Security. Pattern Recognition Letters 25, 1893–1903 (2004)CrossRefGoogle Scholar
  4. 4.
    Fridrich, J., Goljan, M.: Protection of Digital Images Using Self Embedding. In: Proceedings of Symposium on Content Security and Data Hiding in Digital Media (1999)Google Scholar
  5. 5.
    Wang, S.S., Tsai, S.L.: Automatic Image Authentication and Recovery Using Fractal Code Embedding and Image Inpainting. Pattern Recognition 41, 701–712 (2008)MATHCrossRefGoogle Scholar
  6. 6.
    Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: A Secure and Improved Self-embedding Algorithm to Combat Digital Document Forgery. Signal Processing 89(12), 2324–2332 (2009)CrossRefGoogle Scholar
  7. 7.
    Lee, T.Y., Lin, S.D.: Dual Watermark for Image Tamper Detection and Recovery. Pattern Recognition 41, 3497–3506 (2008)MATHCrossRefGoogle Scholar
  8. 8.
    Yang, C.W., Shen, J.J.: Recover the Tampered Image Based on VQ Indexing. Signal Processing 90(1), 331–343 (2010)MATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Zhang, X., Wang, S., Feng, G.: Fragile Watermarking Scheme with Extensive Content. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol. 5703, pp. 268–278. Springer, Heidelberg (2009)Google Scholar
  10. 10.
    Hamilton, J.F., Adams, J.E.: Adaptive Color Plane Interpolation in Single Sensor Color Electronic Camera, U.S. Patent 5 629 734 (1997)Google Scholar
  11. 11.
    Zhang, L., Wu, X.: Color Demosaicking via Directional Linear Minimum Mean Square-error Estimation. IEEE Transactions on Image Processing 14, 2167–2178 (2005)CrossRefGoogle Scholar
  12. 12.
    Li, X., Gunturk, B., Zhang, L.: Image Demosaicing: A Systematic Survey. In: Proceedings of the SPIE, Visual Communications and Image Processing 2008, San Jose, CA, USA, vol. 6822, pp. 68221J–68221J-15 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Zhenxing Qian
    • 1
  • Guorui Feng
    • 1
  • Yanli Ren
    • 1
  1. 1.School of Communication and Information EngineeringShanghai UniversityShanghai

Personalised recommendations