Skip to main content

Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks

  • Conference paper
Book cover Advanced Communication and Networking (ACN 2010)

Abstract

This paper is focused on the use of a dual watermark to achieve the goal of effective tamper detection and recovery of images. We combine a Cyclic Redundancy Check and an exclusive-or value from each block to generate watermarks. Information of each watermark is embedded in two blocks. This strategy ensures that if one block is tampered, there is still another block available for image recovery. Our proposed tamper detection algorithm not only uses CRC to detect tampering but also employ a strategy to increase the number of suspected invalid blocks to ensure fully detection and recovery of tampered blocks. The experimental results demonstrate that tampered blocks are correctly detected, and the recovered image has very high quality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chou, C.M., Tseng, D.C.: Affine-Transformation-Invariant Public Fragile Watermarking for 3D Model Authentication. IEEE Computer Graphics and Applications 29(2), 72–79 (2009)

    Article  Google Scholar 

  2. Zhang, X., Wang, S.: Fragile Watermarking With Error-Free Restoration Capability. IEEE Transactions on Multimedia 10(8), 1490–1499 (2008)

    Article  Google Scholar 

  3. Wang, K., Lavoue, G., Denis, F., Baskurt, A.: Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform. IEEE Transactions on Information Forensics and Security 3(4), 620–634 (2008)

    Article  Google Scholar 

  4. Ho, A.T.S., Zhu, X., Shen, J., Marziliano, P.: Fragile Watermarking Based on Encoding of the Zeroes of the -Transform. IEEE Transactions on Information Forensics and Security 3(3), 567–569 (2008)

    Article  Google Scholar 

  5. Jun, S., Alam, M.S.: Fragility and Robustness of Binary-Phase-Only-Filter-Based Fragile/Semifragile Digital Image Watermarking. IEEE Transactions on Instrumentation and Measurement 57(3), 595–606 (2008)

    Article  Google Scholar 

  6. Zhang, X., Wang, S.: Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Processing Letters 14(10), 727–730 (2007)

    Article  Google Scholar 

  7. Wang, Y.P., Hu, S.M.: A New Watermarking Method for 3D Models Based on Integral Invariants. IEEE Transactions on Visualization and Computer Graphics 15(2), 285–294 (2009)

    Article  Google Scholar 

  8. Cheung, Y.M., Wu, H.T.: A Sequential Quantization Strategy for Data Embedding and Integrity Verification. IEEE Transactions on Circuits and Systems for Video Technology 17(8), 1007–1016 (2007)

    Article  Google Scholar 

  9. Liu, K.C., Chou, C.H.: Robust and Transparent Watermarking Scheme for Color Images. IET Image Processing 3(4), 228–242 (2009)

    Article  Google Scholar 

  10. Wang, K., Lavoue, G., Denis, F., Baskurt, A.: Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform. IEEE Transactions on Information Forensics and Security 3(4), 620–634 (2008)

    Article  Google Scholar 

  11. Zhang, C., Cheng, L.L., Zhengding, Q., Cheng, L.M.: Multipurpose Watermarking Based on Multiscale Curvelet Transform. IEEE Transactions on Information Forensics and Security 3(4), 611–619 (2008)

    Article  Google Scholar 

  12. Pei, S.C., Guo, J.M.: High-capacity Data Hiding in Halftone Images Using Minimal-error Bit Searching and Least-mean Square Filter. IEEE Transactions on Image Processing 15(6), 1665–1679 (2006)

    Article  Google Scholar 

  13. Lin, P.L., Hsieh, C.K., Huang, P.W.: A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery. Pattern Recognition 38, 2519–2529 (2005)

    Article  Google Scholar 

  14. Wang, C.L., Hwang, R.H., Chen, T.S., Lee, H.Y.: Detecting and Restoring System of Tampered Image Based on Discrete Wavelet Transformation and Block Truncation Coding. In: 19th International Conference on Advanced Information Networking and Applications, Taiwan (March 2005)

    Google Scholar 

  15. Tagliasacchi, M., Valenzise, G., Tubaro, S.: Hash-Based Identification of Sparse Image Tampering. IEEE Transactions on Image Processing 18(11), 2491–2504 (2009)

    Article  MathSciNet  Google Scholar 

  16. Li, K.F., Chen, T.S., Wu, S.C.: Image Tamper Detection and Recovery System Based on Discrete Wavelet Transform. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Canada, August 2001, vol. 1, pp. 164–167 (2001)

    Google Scholar 

  17. Lee, T.Y., Lin, S.D.: Dual Watermark for Image Tamper Detection and Recovery. Pattern Recognition 41(11), 3497–3506 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  18. Lin, P.L., Hsieh, C.K., Huang, P.W.: A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery. Pattern Recognition 38, 2519–2529 (2005)

    Article  Google Scholar 

  19. Ritter, T.: The Great CRC Mystery. Dr. Dobb’s Journal of Software Tools 11(2), 26–34, 76-83 (1986)

    Google Scholar 

  20. Huynh-Thu, Q., Ghanbari, M.: Scope of validity of PSNR in image/video quality assessment. Electronics Letters 44(13), 800–801 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lin, CH., Liu, JC., Hsu, WC., Wang, HW., Lin, WC., Li, JW. (2010). Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks. In: Chang, CC., Vasilakos, T., Das, P., Kim, Th., Kang, BH., Khurram Khan, M. (eds) Advanced Communication and Networking. ACN 2010. Communications in Computer and Information Science, vol 77. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13405-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13405-0_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13404-3

  • Online ISBN: 978-3-642-13405-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics