Abstract
This paper proposes a novel fragile watermarking scheme capable of recovering the original principal content in extensive areas. The watermark data are made up of two parts: reference-bits derived from the principal content of the host image and containing some necessary redundancy, and hash-bits matching the content of local blocks. While the reference-bits are embedded into the entire host image, the hash-bits are embedded into the local blocks. On the authentication side, after identifying the tampered areas, the watermark data extracted from the reserved regions can provide sufficient information to restore the principal content of host image even when the rate of tampered blocks is large.
This work was supported by the Natural Science Foundation of China (60872116, 60832010, and 60773079), and the High-Tech Research and Development Program of China (2007AA01Z477).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Vleeschouwer, C., Delaigle, J.-F., Macq, B.: Invisibility and Application Functionalities in Perceptual Watermarking — An Overview. Proc. IEEE 90(1), 64–77 (2002)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding – A Survey. Proc. IEEE 87, 1062–1078 (1999)
Wong, P.W., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification. IEEE Trans. on Image Processing 10(10), 1593–1601 (2001)
Suthaharan, S.: Fragile Image Watermarking Using a Gradient Image for Improved Localization and Security. Pattern Recognition Letters 25, 1893–1903 (2004)
Lu, H., Shen, R., Chung, F.-L.: Fragile Watermarking Scheme for Image Authentication. Electronics Letters 39(12), 898–900 (2003)
He, H., Zhang, J., Tai, H.-M.: A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol. 4283, pp. 422–432. Springer, Heidelberg (2006)
Liu, S.-H., Yao, H.-X., Gao, W., Liu, Y.-L.: An Image Fragile Watermark Scheme Based on Chaotic Image Pattern and Pixel-Pairs. Applied Mathematics and Computation 185(2), 869–882 (2007)
Zhang, X., Wang, S.: Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Processing Letters 14(10), 727–730 (2007)
Zhang, X., Wang, S.: Fragile Watermarking Scheme Using a Hierarchical Mechanism. Signal Processing 89(4), 675–679 (2009)
Fridrich, J., Goljan, M.: Images with Self-correcting Capabilities. In: Proceeding of IEEE International Conference on Image Processing, pp. 792–796 (1999)
Zhu, X., Hob, A., Marziliano, P.: A New Semi-Fragile Image Watermarking with Robust Tampering Restoration Using Irregular Sampling. Signal Processing: Image Communication 22(5), 515–528 (2007)
Zhang, X., Wang, S.: Fragile Watermarking with Error-Free Restoration Capability. IEEE Transactions on Multimedia 10(8), 1490–1499 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, X., Wang, S., Feng, G. (2009). Fragile Watermarking Scheme with Extensive Content Restoration Capability. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds) Digital Watermarking. IWDW 2009. Lecture Notes in Computer Science, vol 5703. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03688-0_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-03688-0_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03687-3
Online ISBN: 978-3-642-03688-0
eBook Packages: Computer ScienceComputer Science (R0)