Abstract
This paper is focused on the use of a dual watermark to achieve the goal of effective tamper detection and recovery of images. We combine a Cyclic Redundancy Check and an exclusive-or value from each block to generate watermarks. Information of each watermark is embedded in two blocks. This strategy ensures that if one block is tampered, there is still another block available for image recovery. Our proposed tamper detection algorithm not only uses CRC to detect tampering but also employ a strategy to increase the number of suspected invalid blocks to ensure fully detection and recovery of tampered blocks. The experimental results demonstrate that tampered blocks are correctly detected, and the recovered image has very high quality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chou, C.M., Tseng, D.C.: Affine-Transformation-Invariant Public Fragile Watermarking for 3D Model Authentication. IEEE Computer Graphics and Applications 29(2), 72–79 (2009)
Zhang, X., Wang, S.: Fragile Watermarking With Error-Free Restoration Capability. IEEE Transactions on Multimedia 10(8), 1490–1499 (2008)
Wang, K., Lavoue, G., Denis, F., Baskurt, A.: Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform. IEEE Transactions on Information Forensics and Security 3(4), 620–634 (2008)
Ho, A.T.S., Zhu, X., Shen, J., Marziliano, P.: Fragile Watermarking Based on Encoding of the Zeroes of the -Transform. IEEE Transactions on Information Forensics and Security 3(3), 567–569 (2008)
Jun, S., Alam, M.S.: Fragility and Robustness of Binary-Phase-Only-Filter-Based Fragile/Semifragile Digital Image Watermarking. IEEE Transactions on Instrumentation and Measurement 57(3), 595–606 (2008)
Zhang, X., Wang, S.: Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels. IEEE Signal Processing Letters 14(10), 727–730 (2007)
Wang, Y.P., Hu, S.M.: A New Watermarking Method for 3D Models Based on Integral Invariants. IEEE Transactions on Visualization and Computer Graphics 15(2), 285–294 (2009)
Cheung, Y.M., Wu, H.T.: A Sequential Quantization Strategy for Data Embedding and Integrity Verification. IEEE Transactions on Circuits and Systems for Video Technology 17(8), 1007–1016 (2007)
Liu, K.C., Chou, C.H.: Robust and Transparent Watermarking Scheme for Color Images. IET Image Processing 3(4), 228–242 (2009)
Wang, K., Lavoue, G., Denis, F., Baskurt, A.: Hierarchical Watermarking of Semiregular Meshes Based on Wavelet Transform. IEEE Transactions on Information Forensics and Security 3(4), 620–634 (2008)
Zhang, C., Cheng, L.L., Zhengding, Q., Cheng, L.M.: Multipurpose Watermarking Based on Multiscale Curvelet Transform. IEEE Transactions on Information Forensics and Security 3(4), 611–619 (2008)
Pei, S.C., Guo, J.M.: High-capacity Data Hiding in Halftone Images Using Minimal-error Bit Searching and Least-mean Square Filter. IEEE Transactions on Image Processing 15(6), 1665–1679 (2006)
Lin, P.L., Hsieh, C.K., Huang, P.W.: A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery. Pattern Recognition 38, 2519–2529 (2005)
Wang, C.L., Hwang, R.H., Chen, T.S., Lee, H.Y.: Detecting and Restoring System of Tampered Image Based on Discrete Wavelet Transformation and Block Truncation Coding. In: 19th International Conference on Advanced Information Networking and Applications, Taiwan (March 2005)
Tagliasacchi, M., Valenzise, G., Tubaro, S.: Hash-Based Identification of Sparse Image Tampering. IEEE Transactions on Image Processing 18(11), 2491–2504 (2009)
Li, K.F., Chen, T.S., Wu, S.C.: Image Tamper Detection and Recovery System Based on Discrete Wavelet Transform. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Canada, August 2001, vol. 1, pp. 164–167 (2001)
Lee, T.Y., Lin, S.D.: Dual Watermark for Image Tamper Detection and Recovery. Pattern Recognition 41(11), 3497–3506 (2008)
Lin, P.L., Hsieh, C.K., Huang, P.W.: A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery. Pattern Recognition 38, 2519–2529 (2005)
Ritter, T.: The Great CRC Mystery. Dr. Dobb’s Journal of Software Tools 11(2), 26–34, 76-83 (1986)
Huynh-Thu, Q., Ghanbari, M.: Scope of validity of PSNR in image/video quality assessment. Electronics Letters 44(13), 800–801 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lin, CH., Liu, JC., Hsu, WC., Wang, HW., Lin, WC., Li, JW. (2010). Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks. In: Chang, CC., Vasilakos, T., Das, P., Kim, Th., Kang, BH., Khurram Khan, M. (eds) Advanced Communication and Networking. ACN 2010. Communications in Computer and Information Science, vol 77. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13405-0_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-13405-0_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13404-3
Online ISBN: 978-3-642-13405-0
eBook Packages: Computer ScienceComputer Science (R0)