Advertisement

Self-recovery Fragile Watermarking Scheme with Variable Watermark Payload

  • Fan Chen
  • Hongjie He
  • Yaoran Huo
  • Hongxia Wang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7128)

Abstract

To take into account security, invisibility and recovery quality, this work proposes a variable-payload self-recovery fragile watermarking scheme. For each block, the watermarks include the total-watermark with variable number of bits and the basic-watermark of length 24 bits. The two watermark versions of each block are embedded into the less significant bit planes of the different blocks based on the secret key, respectively. They not only can partially resolve the coincidence tampering problem, but also improve the performance of tamper detection. The variable watermark payload preserves the adequate information of image block to as few bits as possible. Simulation results demonstrate that the proposed scheme not only provides a better invisibility and security against the known counterfeiting attacks, but also allows image recovery with an acceptable visual quality up to 60% tampering.

Keywords

fragile watermarking self-recovery variable watermark payload 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Vleeschouwer, C., Delaigle, J.-F., Macq, B.: Invisibility and application functionalities in perceptual watermarking–An overview. Proc. IEEE 90(1), 64–77 (2002)CrossRefGoogle Scholar
  2. 2.
    Zhang, X., Wang, S., Qian, Z., Feng, G.: Reference Sharing Mechanism for Watermark Self-Embedding. IEEE Trans. On Image Processing 20(2), 485–495 (2011)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans on Image Processing (10), 1593–1601 (2001)Google Scholar
  4. 4.
    Fridrich, J., Goljan, M.: Images with Self-Correcting Capabilities. In: ICIP 1999, Kobe, Japan, October 25-28 (1999)Google Scholar
  5. 5.
    He, H., Zhang, J., Chen, F.: Adjacent-Block Based Statistical Detection Method for Self-Embedding Watermarking Techniques. Signal Processing 89, 1557–1566 (2009)zbMATHCrossRefGoogle Scholar
  6. 6.
    Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38(12), 2519–2529 (2005)CrossRefGoogle Scholar
  7. 7.
    Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recognition 41(11), 3497–3506 (2008)zbMATHCrossRefGoogle Scholar
  8. 8.
    Yang, C.W., Shen, J.J.: Recover the tampered image based on VQ indexing. Signal Processing 90, 331–343 (2010)zbMATHCrossRefGoogle Scholar
  9. 9.
    Qian, Z., Feng, G., Zhang, X., Wang, S.: Image self-embedding with high-quaility restoration capability. Digital Signal Processing 21, 278–286 (2011)CrossRefGoogle Scholar
  10. 10.
    Chang, C., Fan, Y.-H., Tai, W.-L.: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41, 654–661 (2008)zbMATHCrossRefGoogle Scholar
  11. 11.
    Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique. Electron. Imaging 11(4), 262–274 (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Fan Chen
    • 1
  • Hongjie He
    • 2
  • Yaoran Huo
    • 2
  • Hongxia Wang
    • 1
  1. 1.Information Security and National Computing Grid LabSouthwest Jiaotong UniversityChengduChina
  2. 2.Sichuan Key Lab of Signal and Information ProcessingSouthwest Jiaotong UniversityChengduChina

Personalised recommendations