Abstract
To take into account security, invisibility and recovery quality, this work proposes a variable-payload self-recovery fragile watermarking scheme. For each block, the watermarks include the total-watermark with variable number of bits and the basic-watermark of length 24 bits. The two watermark versions of each block are embedded into the less significant bit planes of the different blocks based on the secret key, respectively. They not only can partially resolve the coincidence tampering problem, but also improve the performance of tamper detection. The variable watermark payload preserves the adequate information of image block to as few bits as possible. Simulation results demonstrate that the proposed scheme not only provides a better invisibility and security against the known counterfeiting attacks, but also allows image recovery with an acceptable visual quality up to 60% tampering.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Vleeschouwer, C., Delaigle, J.-F., Macq, B.: Invisibility and application functionalities in perceptual watermarking–An overview. Proc. IEEE 90(1), 64–77 (2002)
Zhang, X., Wang, S., Qian, Z., Feng, G.: Reference Sharing Mechanism for Watermark Self-Embedding. IEEE Trans. On Image Processing 20(2), 485–495 (2011)
Wong, P.W., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans on Image Processing (10), 1593–1601 (2001)
Fridrich, J., Goljan, M.: Images with Self-Correcting Capabilities. In: ICIP 1999, Kobe, Japan, October 25-28 (1999)
He, H., Zhang, J., Chen, F.: Adjacent-Block Based Statistical Detection Method for Self-Embedding Watermarking Techniques. Signal Processing 89, 1557–1566 (2009)
Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 38(12), 2519–2529 (2005)
Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recognition 41(11), 3497–3506 (2008)
Yang, C.W., Shen, J.J.: Recover the tampered image based on VQ indexing. Signal Processing 90, 331–343 (2010)
Qian, Z., Feng, G., Zhang, X., Wang, S.: Image self-embedding with high-quaility restoration capability. Digital Signal Processing 21, 278–286 (2011)
Chang, C., Fan, Y.-H., Tai, W.-L.: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41, 654–661 (2008)
Fridrich, J., Goljan, M., Memon, N.: Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique. Electron. Imaging 11(4), 262–274 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, F., He, H., Huo, Y., Wang, H. (2012). Self-recovery Fragile Watermarking Scheme with Variable Watermark Payload. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-32205-1_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32204-4
Online ISBN: 978-3-642-32205-1
eBook Packages: Computer ScienceComputer Science (R0)