Share This Article:

A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections

Abstract Full-Text HTML Download Download as PDF (Size:1223KB) PP. 103-107
DOI: 10.4236/opj.2013.32B026    4,162 Downloads   5,995 Views   Citations

ABSTRACT

A fragile self-recovery watermarking scheme with simple and effective tamper detection capability is proposed in this paper. In conventional fragile watermark for tamper detection and recovery, the parity section of the watermark is used for tamper detection and the restoration section of the watermark is used for image recovery, separately. In addition, to provide second chance for block recovery in case one copy is destroyed, Lee and Lin proposed dual watermarking scheme in which two copies of restoration watermark are embedded. In the proposed new scheme, fragile watermark with one parity section and two restoration sections are embedded, too. In addition to the second chance for image restoration, the two restoration sections as well as the parity section are all used for tamper detection. Experimental results show that the tamper detection capability is superior to other techniques.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

C. Wu and Y. Shih, "A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections," Optics and Photonics Journal, Vol. 3 No. 2B, 2013, pp. 103-107. doi: 10.4236/opj.2013.32B026.

References

[1] J. Fridrich, “Security of Fragile Authentication Water-Marks with Localization,” Proceedings of SPIE 4675, Security and Watermarking of Multimedia Contents IV, Vol. 691, 2002, pp. 691-700. doi:10.1117/12.465330
[2] H. J. He, F. Chen, H.-M. Tai, T. Kalker and Jiashu Zhang, “Performance Analysis of A Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme,” IEEE Transactions on Information Forensics and Security, Vol.7, No.1, 2012, pp.185-196. doi:10.1109/TIFS.2011.2162950
[3] T.-Y. Lee, S. F. Lin and D. Dual, “Watermark for Image Tamper Detection and Recovery,” Pattern Recognition, Vol.41, No.11, 2008, pp. 3497-3506. doi:10.1016/j.patcog.2008.05.003
[4] P. L. Lin, C.-K. Hsieh and P.-W. Huang, “A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery,” Pattern Recognition, Vol.38, No.12, 2005, pp. 2519-2529. doi:10.1016/j.patcog.2005.02.007
[5] M. Utku Celik, G. Sharma, E. Saber and A. Murat Tekalp, “Hierarchical Watermarking for Secure Image Authentication with Localization,” IEEE Transactions on Image Processing, Vol. 11, No.6, 2002, pp. 585-595. doi:10.1109/TIP.2002.1014990
[6] X. P. Zhang and S. Z. Wang, “Fragile Watermarking with Error-Free Restoration Capability,” IEEE Transactions on Multimedia, Vol.10, No.8, pp. 1490-1499, 2008. doi:10.1109/TMM.2008.2007334
[7] X. P. Zhang and S. Z. Wang, “Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels,” IEEE Signal Processing Letters, Vol.14, No.10, 2007, pp. 727-730.doi:10.1109/LSP.2007.896436

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.