Semi-Fragile Watermarking for Image Tamper Detection and Self-Recovery Based on Discrete Cosine Transform

Document Type : Original Article

Authors

Computer Engineering, Faculty of Engineering, Ferdowsi University of Mashhad

Abstract

Digital watermarking technique embeds additional data (watermark) into digital contents in such a way that the resulting distortion is imperceptible. Tampered detection and recovery is one of the digital watermarking applications. Tamper detection and recovery can mine the tampered region in the image and then recover it. This application can resolve the problem of digital content modification. In this paper, a novel watermarking approach is proposed for tamper detection and recovery in the compressed and uncompressed images. In this method, each block in the image contains watermark of another block. Therefore, for each non-overlapping block in the image, there exists one copy of the watermark. Here, the Chaotic map is used to improve security and confuse block. Also, a secret key is transmitted along with the watermarked image. In our algorithm, a 90% tampered image can be recovered by PSNR ≈ 20 dB. Experimental results demonstrate that the proposed method is secure and superior to the other techniques, especially when the tampered area is large and is resistant to compression.

Keywords


[1]G.Friedman, "The trustworthy digital camera: restoring credibility to the photographic image," IEEE Transactions on Consumer Electronics, vol. 39, no. 4, pp. 905-910, 1993.
[2] C. Lu, "Meanquantizationfragile watermarking for image auth-entication,"Optical Engineering, vol.40, no.7, p.1396, 2001.
[3] C. Linand S.Chang,"Semi fragile watermarking for authentic-citing JPEG visual content,"Security and Watermarking of Multimedia Contents II,vol. 3971, pp. 140-151,2000.
[4] J. Fridrich, "A hybrid watermark for tamper detection in digital images,"Signal Processing and Its Applications, vol. 1, pp. 301-304, 1999.
[5] J. Zhao, "Embedding Robust Labels intoImages forCopyright Protection,"Proceedings of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, pp. 242-251, 1995.
[6] H. Mark Liao, C.Sze, Sh.Huang and CS.Lu, "Cocktail watermarking for digital image prote-ction,"IEEE Trans.Multimedia, vol. 2, no. 4, pp. 209-224, 2000.
[7] P. Lin, C. Hsieh and P. Huang, "A hierarchical digital watermarking method for image tamperdetection and recovery,"Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005.
[8] L. Laouamer, M. AlShaikh, L. NanaandAC. Pascu,"Robust Watermarking Scheme andTamper Detection Based On Threshold Versus Intensity,"Journal of Innovation in Digital Ecosystems,vol. 2,no. 1,pp.1-12.,2016.
[9] T. Lee and S. Lin, "Dual watermark for image tamper detection and recovery,"Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008.
[10]T. Jing, X.Li and F.Zhang, "Image tamper detection algorithm based on Radon and Fourier-Mellin transform,"IEEE International Conference on Information Theory and Information Security,pp. 212-215,2010.
[11] R. Chamlawi, A. Khan and I. Usman, "Authentication and recovery of images using multiple watermarks,"Computers & Electrical Engineering, vol. 36, no. 3, pp. 578-584, 2010.
[12] A. Phadikar, S. Maity and M. Mandal, "Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images,"Journal ofVisual Communication and Image Representation, vol. 23, no. 3, pp. 454-466, 2012.
[13]Al-OtumandH. Munawer,"Semi-Fragile Watermarking for Grayscale Image Authentication andTamper Detection Based On anAdjusted Expanded-Bit Multiscale Quantization-Based Technique,"Journal of Visual Communication and Image Representation,vol. 25, no. 5, pp.1064-1081,2016.
[14] S. Dadkhah, AA. Manaf, Y. Hori, AE. Hassanienand S. Sadeghi, "An Effective SVD-Based Image Tampering Detection and Self-Recovery Using ActiveWatermarking,"Signal Processing: Image Communication,vol. 29, no. 10,pp. 1197-1210,2016.
[15] M. Iwata, T. Hori, A. Shiozaki and A. Ogihara, "Digital watermarking method for tamper detection and recovery of JPEG images,"International Symposium OnInformation Theory & Its Applications,pp. 309-314,2010.
[16] X. Tong, Y. Liu, M. Zhang and Y. Chen, "A novel chaos-based fragile watermarking for image tampering detection and self-recovery,"Signal Processing: Image Communication, vol. 28, no. 3, pp. 301-308, 2013.
[17] P. Singh and R. Chadha, "A survey of digital watermarking techniques, applications and attacks,"International Journal of Engineering and Innovative Technology, vol. 2, no. 9, 2013.
[18] C. Wu and Y. Shih, "A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections,"Optics and Photonics Journal, vol. 3, no. 02, pp. 103-107, 2013.
[19] J. Chen and C. Chen, "Image Tamper Detection Scheme Using QR Code and DCT TransformTechniques,"International Journal of Computer, Consumer and Control, vol. 1, no. 2, 2012.
[20] C.Wang, RH.Hwang, TS.Chen and HY.Lee, "Detecting and Restoring System of Tampered Image Based on Discrete Wavelet Transformation and Block Truncation Coding,"19th International Conference on Advanced Information Networking and Applications vol.1, 2005.
[21] O. Benrhouma,H. Houcemeddineand Safya Belghith,"Tamper Detection and Self-Recovery Scheme by DWT Watermarking,"Nonlinear Dynamics,vol. 79,no. 3, pp. 1817-1833, 2014.
[22]C. Li, A. Zhang, Z. Liu, L. Liao and D. Huang,"Semi-Fragile Self-Recoverable Watermarking Algorithm Based On Wavelet Group Quantization and Double Authentication,"Multimedia tools and applications,vol. 74,no. 23, pp.728-739, 2016.
[23] SB. SolorioandK. Nandi,"Secure fragile watermarking method for image authentication withimproved tampering localization and self-recoverable capabilities,"vol. 91, no. 4, pp.728-739,2011.
[24] MJ. TsaiandC. Chien,"Authentication and recovery for wavelet-based semifragile watermarking,"Optical Engineering,vol. 47, no. 6,p. 067005,2008.
[25]JW. Wang, SG. LianandY. Dai,"Secure multimedia watermarking authentication in wavelet domain,"Journal of Electronic Imaging, vol. 17, no. 3, pp. 033010:1-033010:12, 2008.
[26]F. Petitcolas, Watermarking Stirmark, http://petitcolas.net/-fabien/watermarking/stirmark/, 2012.