Skip to main content
Log in

Face region authentication and recovery system based on SPIHT and watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The face regions of digital pictures are some of the principal target of tampering to generate a potential scandal, causing social and economic damages to involved persons. In this paper, we propose a face region authentication and recovery system, in which the face regions are automatically protected at the moment when the picture is taken by a digital camera. When the original face of the picture is replaced by another face by malicious person, the system can detect the tampered face and recover the original one. The proposed system consists of two stages: the face region protection stage and the face region tamper detection and recovery stage. In both stages, the face detection module based on the Viola-Jones algorithm, face region encoding/decoding modules based on the Set Partitioning in Hierarchical Trees (SPIHT) algorithm and watermarking module based on Quantization Index Modulation (QIM) are used. These three algorithms, Viola-Jones detector, SPIHT and QIM, are determined as most adequate algorithms for proposed system after several evaluations. The experimental results show a high quality of the watermarked as well as the recovered images, obtaining average Peak Signals to Noise Ratios (PSNR) of more than 40 and 38 dB, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Chen M, Sun X (2010) A digital image watermarking of self-recovery based on the SPIHT algorithm. Int Conf Signal Process Syst 2:621–624

    Google Scholar 

  2. Chen B, Wornell GW (2001) Quantization Index Modulation: a class of provably good method for digital watermarking and information embedding. IEEE Trans Inf Theory 47:1423–1443

    Article  MathSciNet  MATH  Google Scholar 

  3. Crow F (1984) Summed-area tables for texture mapping. Proc SIGGRAPH 18:207–212

    Article  Google Scholar 

  4. Cruz C, Reyes R, Nakano M, Perez H (2010) Semi-fragile watermarking based content image authentication scheme (Spanish). Rev Fac Ing 56:160–169

    Google Scholar 

  5. Hartung F, Ramme F (2000) Digital rights management and watermarking of multimedia content for m-commerce applications. IEEE Commun Mag 38(11):78–84

    Article  Google Scholar 

  6. Jain V, Learned-Miller E (2010) FDDB: a benchmark for face detection in unconstrained setting, Technical Report UM-CS-2010-009, Dept. of Computer science, Univ. of Massachusetts, Amherst

  7. Kanamori T, Takenouchi T, Mutara N (2007) Tutorial series en brain-inspired computing part 6: geometrical structuring of boosting algorithm. N Gener Comput 25(1):117–141

    Article  MATH  Google Scholar 

  8. Kaur R, Kaushal N (2010) Comparative analysis of various compression methods for medical images. Poc ISCET 101:137–142

    Google Scholar 

  9. Lee T, Lin S (2008) Dual watermark for image tamper detection and recovery. Pattern Recogn 41:3497–3506

    Article  MATH  Google Scholar 

  10. Lenarczyk P, Piotrowski Z (2013) Parallel blind digital image watermarking in spatial and frequency domain. Telecommun Syst Model Anal Des Manag. doi:10.1007/s11235-013-9734-x

    Google Scholar 

  11. Lian S, Chen X (2012) Lightweight secure multimedia distribution based on homomorphic operations. Telecommun Syst 49(2):187–197

    Article  MathSciNet  Google Scholar 

  12. Lin S, Lin J, Chen C (2011) A ROI-based semi-fragile watermarking for image tamper detection and recovery. Int J Innov Comput Inf Contr 7(12):6875–6888

    Google Scholar 

  13. Luo H, Chu S, Lu Z (2008) Self embedding watermarking using halftoning technique. Circ Syst Sig Process 27:155–170

    Article  MathSciNet  Google Scholar 

  14. Phadikar A, Maity A, Mandal M (2012) Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J Vis Commun Image Represent 23:608–613

    Article  Google Scholar 

  15. Rosales L, Cedillo M, Nakano M, Perez M, Kurkoski B (2013) Watermarking-based image authentication with recovery capability using halftoning technique. Signal Process Image Commun 28:69–83

    Article  Google Scholar 

  16. Said A, Pearlman W (1996) A new, fast and efficient image codec based on set partitioning in hierarchical trees. IEEE Trans Circ Syst Video Technol 6(3):243–250

    Article  Google Scholar 

  17. Sang J, Zhang B, Hung D, Xiang H, Xu H, Sang N (2013) Performance analysis on a watermarking method based on double random phase encoding technique. Optik–Int J Light Electron Optics 124(24):6512–6515

    Article  Google Scholar 

  18. Viola P, Jones M (2001) Rapid object detection using a boosting cascade of simple features. IEEE CVPR 1:511–518

    Google Scholar 

  19. Viola P, Jones M (2004) Robust real-time face detection. Int J Comput Vis 57(2):137–154

    Article  Google Scholar 

  20. Wang J, Lian S, Wang J (2013) Hybrid additive multi-watermarking and decoding. Multimedia Systems. doi:10.1007/s00530-013-0338-9

    Google Scholar 

  21. Yang H, Yin J (2013) A secure removable visible watermarking for BTC compressed images. Multimed Tools Appl. doi:10.1007/s11042-013-1714-3

    Google Scholar 

  22. Zhang X, Qjan Z, Ren Y, Feng G (2011) Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Trans Inf Forensic Secur 6(4):1223–1232

    Article  Google Scholar 

  23. Zhang C, Zhang Z (2010) Boosting-based face detection and adaptation. Morgan & Claypool Publishers, San Francisco

    Google Scholar 

Download references

Acknowledgments

Authors thank the National Council of Science and Technology of Mexico (CONACyT) and IPN for financial support to carry out this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mariko Nakano-Miyatake.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cruz-Ramos, C., Nakano-Miyatake, M., Perez-Meana, H. et al. Face region authentication and recovery system based on SPIHT and watermarking. Multimed Tools Appl 74, 7685–7709 (2015). https://doi.org/10.1007/s11042-014-2006-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2006-2

Keywords

Navigation