Advertisement

Image Tampering Location and Restoration Watermarking Based on Blockchain Technology

  • Wangsheng Fang
  • Yuyao WangEmail author
  • Xiangyu Wang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1117)

Abstract

With the development of multimedia technology and network communication, digital watermarking technology has become one of the research hotspots in the field of signal processing and information security in recent years. In this paper, an effective fragile block watermarking method for image tampering localization is proposed. Compared with the existing algorithms, it has better localization effect. With the idea of blockchain, the algorithm first forms a linear cyclic chain from all blocks in the image on the basis of the key, which is called blockchain. Then the watermarking of the image block is hidden in the subsequent blocks, which ensures the content of the image block and the security of the embedded watermarking. Theoretical analysis and experimental results show that this method can resist VQ and collage attacks well, and has high positioning accuracy.

Keywords

Image watermarking Blockchain technology Image restoration 

References

  1. 1.
    Botta, M., Cavagnino, D., Pomponiu, V.: A successful attack and revision of a chaotic system based fragile watermarking scheme for image tamper detection. AEU Int. J. Electron. Commun. 69(1), 242–245 (2015)CrossRefGoogle Scholar
  2. 2.
    Wong, P.: A public key watermark for image verification and authentication. In: Proceedings of IEEE International Conference on Image Processing, Chicago, IL, pp. 425–429 (1998)Google Scholar
  3. 3.
    Holliman, H., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9(3), 432–441 (2000)CrossRefGoogle Scholar
  4. 4.
    Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J. Electron. Imaging 11, 262–274 (2002)CrossRefGoogle Scholar
  5. 5.
    Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10, 1593–1601 (2001)CrossRefGoogle Scholar
  6. 6.
    Fridrich, J.: Security of fragile authentication watermarks with localization. In: Proceedings of SPIE. Security and Watermarking of Multimedia Contents, San Jose, CA, vol. 4675, pp. 691–700 (2002)Google Scholar
  7. 7.
    Bravo-Solorio, S., Calderon, F., Li, C.T., et al.: Fast fragile watermark embedding and iterative mechanism with high self-restoration performance. Digit. Signal Process. 73, 83–92 (2018)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Benrhouma, O., Hermassi, H., El-Latif, A.A.A., et al.: Chaotic watermark for blind forgery detection in images. Multimedia Tools Appl. 75(14), 8695–8718 (2016)CrossRefGoogle Scholar
  9. 9.
    Botta, M., Cavagnino, D., Pomponiu, V.: Fragile watermarking using Karhunen-Loève transform: the KLT-F approach. Soft. Comput. 19(7), 1905–1919 (2015)CrossRefGoogle Scholar
  10. 10.
    Rajput, V., Ansari, I.A.: Image tamper detection and self-recovery using multiple median watermarking. Multimedia Tools Appl. 1–17 (2019)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Jiangxi University of Science and TechnologyGanzhouChina

Personalised recommendations