Abstract
The problem of digital forgeries has become more and more serious in various fields like entertainment, digital forensics, and journalism. This paper proposes a self-embedding watermarking scheme for the restoration of an image after tampering by digital forgery. In this study, an absolute moment block truncation coding image was used as a watermark, in which the image was a compressed version of the original cover image and contained the content features of the cover image. Therefore, it was perfectly possible to perform self-embedding. The watermark was embedded using the LSB and 2LSB for the pixels of the cover image. This procedure made it possible to recover the original watermarked image from a tampered watermarked image. Furthermore, there was no problem in reconstructing it when the rate of tampering was more than 80%. In addition, we verified our proposed self-embedding scheme through an experiment. As a result of the experiment, the recovered image showed good perceptual quality compared to that of the previous scheme.
Similar content being viewed by others
References
Wu M, Liu B (2004) Data hiding in binary image for authentication and annotation. IEEE Trans Multimedia 6(4):528–538
Katzenbeisser S, Petitcolas FAP (2000) Information techniques for steganography and digital watermarking. Artec house, Norwood, MA
Farid H (2009) Image forgery detection. IEEE Signal Process Mag 26(2):16–25
Baek J, Kim C, Fisher PS (2010) (N, 1) secret sharing approach based on steganography with gray digital images. In: Proceedings 2010 IEEE international conference on wireless communications, networking and information security (WCNIS), pp 325–329
Kim C (2010) Data hiding based on compressed dithering images. In: Proceedings advances in intelligent information and database systems, studies in computational intelligence, vol 283, pp 89–98
Kim C, Yang CN (2015) Watermark with DSA signature using predictive coding. Multimedia Tools and Applications 74(14):5189–5203
Iran faked missile test image, BBC news, 10 July 2008
Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verication. IEEE Trans Image Process 10(10):1593–1601
Suthaharan S (2004) Fragile image watermarking using a gradient image for improved localization and security. Pattern Recogn Lett 25:1893–1903
Lu H, Shen R, Chung F-L (2003) Fragile watermarking scheme for image authentication. Electron Lett 39(12):898–900
He H, Zhang J, Tai H-M (2006) A wavelet-based fragile watermarking scheme for secure image authentication. In: Proceedings IWDW 2006. Lecture notes in computer science, pp 422–432
Liu S-H, Yao H-X, Gao W, Liu Y-L (2007) An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Appl Math Comput 185(2):869–882
Lin C-Y, Chang S-F (2001) SARI: Self-Authentication-and-recovery image watermarking system. In: Proceedings 9th ACM international conference multimedia, pp 628–629
Luo H, Chu S-C, Lu Z-M (2008) Self embedding watermarking using halftoning technique. Circuits Syst Signal Process 27(2):155–170
Cheddad A, Condell J, Curran K, Kevitt PM (2009) A secure and improved self-embedding algorithm to combat digital document forgery. Signal Process 89(12):2324–2332
Fridrich J, Goljan M (1999) Images with self-correcting capabilities. In: Proceedings IEEE international conference Image Process, pp 792–796
He H, Zhang J, Chen F (2009) Adjacent-block based statistical detection method for self-embedding watermarking techniques. Signal Process 89:1557–1566
Zhang X, Wang S, Feng G (2009) Fragile watermarking scheme with extensive content. In: IWDW 2009, Lecture notes in computer science, vol 5703, pp 268–278
Qian Z, Feng G, Zhang X, Wang S (2011) Image self-embedding with high-quality, restoration capability. Digital Signal Process 21:278–286
Zhang X, Wang S (2007) Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Process Lett 14(10):727–730
Zhang X, Wang S (2009) Fragile watermarking scheme using a hierarchical mechanism. Signal Process 89(4):675–679
Lema MD, Mitchell OR (1984) Absolute moment blocking truncation coding and its application to color image. IEEE Trans Commun 32(10):1148–1157
Delp EJ, Mitchell OR (1979) Image compression using block truncation coding. IEEE Trans Commun 27(9):1335–1342
Acknowledgements
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2015R1D1A1A01059253). This work was supported under the framework of the international cooperation program managed by the National Research Foundation of Korea (2016K2A9A2A05005255).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Kim, C., Shin, D. & Yang, CN. Self-embedding fragile watermarking scheme to restoration of a tampered image using AMBTC. Pers Ubiquit Comput 22, 11–22 (2018). https://doi.org/10.1007/s00779-017-1061-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-017-1061-x