Skip to main content

Self-Embedding Watermarking Scheme Based on MDS Codes

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9569))

Abstract

This paper proposes a self-embedding watermarking scheme based on Maximum Distance Separable (MDS) codes. The watermark is comprised of the reference-bits and the authentication-bits. The reference-bits is generated by encoding the principal content of all the image blocks. The encoding matrix is derived from the generator matrix of selected systematic MDS code. Based on this encoding method, the reference-bits embedded in an image block will be shared by all the image blocks. Therefore our scheme realize a new reference share mechanism and is immune to the tampering coincidence and the reference waste. Moreover, the maximal tampering rate can be analyzed from the error resilience of the MDS code. On the receiver side, the tampered image blocks can be located by the embedded authentication-bits. As long as the tampering rate is not larger than the maximal tampering rate, the principal content of the tampered image blocks can be recovered perfectly. The restoration is deterministic and the quality of recovered content is constant. Our experimental results demonstrate that the proposed method outperforms the recently state-of-the-art works.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proceeding of IEEE International Conference on Image Processing, pp. 792–796 (1999)

    Google Scholar 

  2. Korus, P., Dziech, A.: Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans. Inf. Forensics Secur. 9(2), 1134–1147 (2014)

    Article  Google Scholar 

  3. Yang, C.W., Shen, J.J.: Recover the tampered image based on VQ indexing. Signal Process. 90(1), 331–343 (2010)

    Article  MATH  Google Scholar 

  4. Huo, Y., He, H., Chen, F.: Alterable capacity fragile watermarking scheme with restoration capability. Opt. Commun. 285(7), 1759–1766 (2012)

    Article  Google Scholar 

  5. Qin, C., Chang, C.-C., Chen, P.-Y.: Self-embedding fragile water-marking with restoration capability based on adaptive bit allocation mechanism. Signal Process. 92(4), 1137–1150 (2012)

    Article  Google Scholar 

  6. He, H., Chen, F., Tai, H.M., Kalker, T., Zhang, J.: Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans. Inf. Forensics Secur. 7(1), 185–196 (2012)

    Article  Google Scholar 

  7. Zhang, X., Qian, Z., Ren, Y., Feng, G.: Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans. Inf. Forensics Secur. 6(4), 1223–1232 (2011)

    Article  Google Scholar 

  8. Lee, T.Y., Lin, S.: Dual watermark for image tampering detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)

    Article  MATH  Google Scholar 

  9. Li, C., Wang, Y., Ma, B., Zhang, Z.: A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. Comput. Electr. Eng. 37(6), 927–940 (2011)

    Article  Google Scholar 

  10. Qin, C., Chang, C.C., Hsu, T.J.: Effective fragile watermarking for image authentication with high-quality recovery capability. KSII Trans. Internet Inf. Syst. 7(11), 2941–2956 (2013)

    Article  Google Scholar 

  11. Qin, C., Chang, C.C., Chen, K.N.: Adaptive self-recovery for tampered images based on VQ indexing and inpainting. Signal Process. 93(4), 933–946 (2013)

    Article  Google Scholar 

  12. Zhang, X., Wang, S., Feng, S.G.: Fragile watermarking scheme with extensive content restoration capability. In: Proceeding of International Workshop Digital Watermark, pp. 268–278 (2009)

    Google Scholar 

  13. Zhang, X., Wang, S., Qian, Z., Feng, G.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485–495 (2011)

    Article  MathSciNet  Google Scholar 

  14. Zhang, X., Wang, S.: Fragile watermarking with error free restoration capability. IEEE Trans. Multimedia 10(8), 1490–1499 (2008)

    Article  Google Scholar 

  15. Zhang, X., Wang, S.: Fragile watermarking scheme using a hierarchical mechanism. Signal Process. 89(4), 675–679 (2009)

    Article  MATH  Google Scholar 

  16. Qian, Z., Feng, G., Zhang, X., Wang, S.: Image self-embedding with high-quality restoration capability. Digit. Signal Process. 21(2), 278–286 (2011)

    Article  MathSciNet  Google Scholar 

  17. Korus, P., Dziech, A.: Efficient method for content reconstruction with self-embedding. IEEE Trans. Image Process. 22(3), 1134–1147 (2013)

    Article  MathSciNet  Google Scholar 

  18. MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error Correcting Codes. North-Holland, Amsterdam (1977)

    MATH  Google Scholar 

Download references

Acknowledgements

This work is supported in part by the National Natural Science Foundation of China (NSFC) (Nos. 61170226, 61170175), and is supported in part by Guangxi Natural Science Foundation under Grant No. 2013GXNSFCA019001.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dongmei Niu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Niu, D., Wang, H., Cheng, M., Zhou, L. (2016). Self-Embedding Watermarking Scheme Based on MDS Codes. In: Shi, YQ., Kim, H., Pérez-González, F., Echizen, I. (eds) Digital-Forensics and Watermarking. IWDW 2015. Lecture Notes in Computer Science(), vol 9569. Springer, Cham. https://doi.org/10.1007/978-3-319-31960-5_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31960-5_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31959-9

  • Online ISBN: 978-3-319-31960-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics