Skip to main content

DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme

  • Conference paper
Book cover Pattern Recognition and Image Analysis (IbPRIA 2013)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 7887))

Included in the following conference series:

Abstract

This paper proposes a self- embedding block wise fragile watermarking scheme with tamper detection and content recovery capability. The proposed scheme embeds the shuffled extensive ten bit Recovery data and two bit Authentication data of the image block into the least significant bits (LSB) of its corresponding mapping block.The integrity of a test block is decided by comparing 2×2 non overlapping block of the test block with its corresponding mapping block. Experimental results show that the suggested scheme outperforms conventional self-recovery fragile watermarking algorithms in alteration detection as well as in tamper recovery of the image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhang, X., Wang, S., Qian, Z., Feng, G.: Self-embedding watermark with flexible restoration Quality. Journal Multimedia Tools and Applications 54, 385–395 (2010)

    Article  Google Scholar 

  2. Shivani, S., Patel, A.K., Kamble, S., Agarwal, S.: An effective pixel-wise fragile watermarking scheme based on ARA bits. In: International Conference on Communication, Computing & Security (ICCCS 2011), pp. 221–226. ACM, New York (2011)

    Google Scholar 

  3. Lin, E.T., Delp, E.J.: A review of fragile Watermarking, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette. IN 47907-2086

    Google Scholar 

  4. He, H.-J., Zhang, J.-S., Tai, H.-M.: Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol. 5806, pp. 132–145. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Zhang, X., Wang, S.: Fragile Watermarking With Error-Free Restoration Capability. IEEE Transaction of Multimedia 10(8) (2008)

    Google Scholar 

  6. Kim, M.-A., Lee, W.-H.: A Content-Based Fragile Watermarking Scheme for Image Authentication. In: Chi, C.-H., Lam, K.-Y. (eds.) AWCC 2004. LNCS, vol. 3309, pp. 258–265. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. He, H., Zhang, J., Chen, F.: Block-wise Fragile Watermarking Scheme Based on Scramble Encryption. IEEE (2007) 978-1-4244-4105-1/07

    Google Scholar 

  8. Seng, W.C., Du, J., Pham, B.: Semi Fragile Watermark with Self Authentication and Self Recovery. Malaysian Journal of Computer Science 22(1) (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shivani, S., Singh, D., Agarwal, S. (2013). DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme. In: Sanches, J.M., Micó, L., Cardoso, J.S. (eds) Pattern Recognition and Image Analysis. IbPRIA 2013. Lecture Notes in Computer Science, vol 7887. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38628-2_76

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38628-2_76

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38627-5

  • Online ISBN: 978-3-642-38628-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics