skip to main content
article
Free access

A sharing-based fragile watermarking method for authentication and self-recovery of image tampering

Published: 01 January 2008 Publication History

Abstract

This study presents an authentication method with self-recovery ability. The hidden watermark in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers the tampered portion. To increase the ability to recover from tampering, the recovery data are shared by using an (r, n) threshold scheme and then scattered all over the image. Experimental results indicate that the visual quality of the watermarked image is acceptable, and that the positions of the tampered portions can be identified. Most importantly, the self -recovery result is very competitive.

References

[1]
C.-S. Lu, S.-K. Huang, C.-J. Sze, and H.-Y. M. Liao, "Cocktail watermarking for digital image protection," IEEE Transactions on Multimedia, vol. 2, no. 4, pp. 209-224, 2000.
[2]
C.-S. Lu and H.-Y. M. Liao, "Structural digital signature for image authentication: an incidental distortion resistant scheme," IEEE Transactions on Multimedia, vol. 5, no. 2, pp. 161-173, 2003.
[3]
B. Zhu, M. D. Swanson, and A. H. Tewfik, "When seeing isn't believing," IEEE Signal Processing Magazine, vol. 21, no. 2, pp. 40-49, 2004.
[4]
C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153-168, 2001.
[5]
P. Tsai, Y.-C. Hu, and C.-C. Chang, "Using set partitioning in hierarchical trees to authenticate digital images," Signal Processing: Image Communication, vol. 18, no. 9, pp. 813-822, 2003.
[6]
C. W. Wu, "On the design of content-based multimedia authentication systems," IEEE Transactions on Multimedia, vol. 4, no. 3, pp. 385-393, 2002.
[7]
M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Transactions on Image Processing, vol. 11, no. 6, pp. 585-595, 2002.
[8]
C.-C. Chang, Y.-S. Hu, and T.-C. Lu, "A watermarking-based image ownership and tampering authentication scheme," Pattern Recognition Letters, vol. 27, no. 5, pp. 439-446, 2006.
[9]
P. L. Lin, C.-K. Hsieh, and P.-W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005.
[10]
H. Luo, S.-C. Chu, and Z.-M. Lu, "Self embedding watermarking using halftoning technique," Circuits, Systems, and Signal Processing, vol. 27, no. 2, pp. 155-170, 2008.
[11]
P. W. Wong, "Public key watermark for image verification and authentication," in Proceedings of IEEE International Conference on Image Processing (ICIP '98), vol. 1, pp. 455-459, Chicago, Ill, USA, October 1998.
[12]
P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593-1601, 2001.
[13]
H.-C. Wu and C.-C. Chang, "Detection and restoration of tampered JPEG compressed images," Journal of Systems and Software, vol. 64, no. 2, pp. 151-161, 2002.
[14]
S.-S. Wang and S.-L. Tsai, "Automatic image authentication and recovery using fractal code embedding and image inpainting," Pattern Recognition, vol. 41, no. 2, pp. 701-712, 2008.
[15]
J. Fridrich, M. Goljan, and N. D. Memon, "Further attacks on Yeung-Mintzer fragile watermarking scheme," in Security and Watermarking of Multimedia Contents II, vol. 3971 of Proceedings of SPIE, pp. 428-437, San Jose, Calif, USA, January 2000.
[16]
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432-441, 2000.
[17]
R. M. Gray and D. L. Neuhoff, "Quantization," IEEE Transactions on Information Theory, vol. 44, no. 6, pp. 2325-2383, 1998.
[18]
C.-C. Thien and J.-C. Lin, "Secret image sharing," Computers & Graphics, vol. 26, no. 5, pp. 765-770, 2002.
[19]
M. Matsumoto and T. Nishimura, "Mersenne twister: a 623- dimensionally equidistributed uniform pseudo-random number generator," ACM Transactions on Modeling and Computer Simulation, vol. 8, no. 1, pp. 3-30, 1998.
[20]
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
[21]
G. R. Blakley, "Safeguarding cryptography keys," in Proceedings of the AFIPS National Computer Conference, vol. 48, pp. 313-317, New York, NY, USA, June 1979.
[22]
C.-C. Chang and R.-J. Hwang, "Sharing secret images using shadow codebooks," Information Sciences, vol. 111, no. 1-4, pp. 335-345, 1998.
[23]
C.-C. Thien and J.-C. Lin, "An image-sharing method with user-friendly shadow images," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 12, pp. 1161-1169, 2003.
[24]
C.-C. Lin and W.-H. Tsai, "Secret image sharing with steganography and authentication," Journal of Systems and Software, vol. 73, no. 3, pp. 405-414, 2004.
[25]
C.-C. Lin and W.-H. Tsai, "Secret image sharing with capability of share data reduction," Optical Engineering, vol. 42, no. 8, pp. 2340-2345, 2003.
[26]
R.-Z. Wang and S.-J. Shyu, "Scalable secret image sharing," Signal Processing: Image Communication, vol. 22, no. 4, pp. 363-373, 2007.
[27]
R. L. Rivest, "The MD5 message digest algorithm," Tech. Rep. RFC 1321, MIT Laboratory for Computer Science and RSA Data Security, Redwood City, Calif, USA, 1992.
[28]
V. Klima, "Finding MD5 collisions--a toy for a notebook," Cryptology ePrint Archive, 2005/075, 2005.
[29]
X. Wang, Y. L. Yin, and H. Yu, "Finding collisions in the full SHA-1," in Proceedings of the 25th Annual International Cryptology Conference (CRYPTO '05), V. Shoup, Ed., vol. 3621 of Lecture Notes in Computer Science, pp. 17-36, Springer, Santa Barbara, Calif, USA, August 2005.
[30]
Y. Linde, A. Buzo, and R. M. Gray, "An algorithm for vector quantizer design," IEEE Transactions on Communications, vol. 28, no. 1, pp. 84-95, 1980.

Cited By

View all
  • (2011)Tampering resistant dual watermarking method for copyright protection of still imagesProceedings of the 2011 international conference on Advanced Computing, Networking and Security10.1007/978-3-642-29280-4_67(575-582)Online publication date: 16-Dec-2011

Recommendations

Comments

Information & Contributors

Information

Published In

cover image EURASIP Journal on Advances in Signal Processing
EURASIP Journal on Advances in Signal Processing  Volume 2008, Issue
January 2008
2311 pages

Publisher

Hindawi Limited

London, United Kingdom

Publication History

Accepted: 24 December 2008
Revised: 24 November 2008
Received: 15 August 2008
Published: 01 January 2008

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)17
  • Downloads (Last 6 weeks)7
Reflects downloads up to 22 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2011)Tampering resistant dual watermarking method for copyright protection of still imagesProceedings of the 2011 international conference on Advanced Computing, Networking and Security10.1007/978-3-642-29280-4_67(575-582)Online publication date: 16-Dec-2011

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media