Fragile Watermarking for Color Images Using Thresholding Technique

In this paper, we propose ablock-wise watermarking scheme for color image authentication to resist malicious tampering of digital media. The thresholding technique is incorporated into the scheme such that the tampered region of the color image can be recovered with high quality while the proofing result is obtained. The watermark for each block consists of its dual authentication data and the corresponding feature information. The feature information for recovery iscomputed bythe thresholding technique. In the proofing process, we propose a dual-option parity check method to proof the validity of image blocks. In the recovery process, the feature information of each block embedded into the color image is rebuilt for high quality recovery. The simulation results show that the proposed watermarking scheme can effectively proof the tempered region with high detection rate and can recover the tempered region with high quality.


Authors:



References:
[1] C.-T. Li and Huayin Si, "Wavelet-based fragile watermarking scheme
for image authentication,"Journal Electron. Imaging, vol. 16, no. 1,
013009, 2007.
[2] H.-J. He, J.-S. Zhang, and F. Chen, "Adjacent-block based statistical
detection method for self-embedding watermarking techniques,"
Signal Processing, vol. 89, no. 8, pp. 1557-1566, 2009.
[3] P.-L. Lin, C.-K. Hsieh, and P.-W. Huang, "A hierarchical digital
watermarking method for image tamper detection and recovery,"
Pattern Recognition, vol. 38, pp. 2519-2529, 2005.
[4] S. D. Lin, Y.-C. Kuo, and M.-H. Yao, "An image watermarking
scheme with tamper detection and recovery," Int. Journal of
Innovative Computing, Information and Control, vol. 3, no. 6, pp.
1379-1387, 2007.
[5] C.-C. Chang, Y.-H. Fan, W.-L. Tai, "Four-scanning Attack on
Hierarchical Digital Watermarking Method for Image Tamper
Detection and Recovery," Pattern Recognition, Vol.41, No.2, pp. 654-
661, 2008.
[6] T.-Y. Lee and S. D. Lin, "Dual watermark for tamper detection and
recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008.
[7] H. He, F. Chen, H.-M. Tai, T. Kalker, and J. Zhang, "Performance
analysis of a block-neighborhood-based self-recovery fragile
watermarking scheme," IEEE Trans. Information Forensics and
Security, vol. 7, no. 1, pp.185-196, 2012.
[8] M. S. Wang and W. C. Chen, "A majority-voting based watermarking
scheme for color image tamper detection and recovery," Computer
Standards & Interfaces, vol. 29, pp. 561-571, 2007.
[9] H. Mirza, H. Thai, and Z. Nakao, "Color image watermarking and
self-recovery based on independent component analysis," Lecture
Notes in Computer Science, vol. 5097, pp. 839-849, 2008.
[10] N. Wang and C.-H. Kim, "Color image of tamper detection and
recovery using block-based watermarking,"in Proc. Int. Conf.
Embedded and Multimedia Computing, 2009, pp. 1-6.
[11] N. Wang and C.-H. Kim, "Tamper detection and self-recovery
algorithm of color image based on robust embedding of dual visual
watermarks using DWT-SVD,"in Proc. Int. Symp. Communications
and Information Technology, 2009, pp. 157-162.
[12] M. Iwata, T. Hori, A. Shiozaki, and A. Ogihara, "Digital
watermarking method for tamper detection and recovery of JPEG
images,"in Proc. Int. Symp. Information Theory and its Applications,
2010, pp. 309-314.
[13] Z. Qian, G. Feng, and Y. Ren, "Fragile watermarking for color image
recovery based on color filter array interpolation,"Lecture Notes in
Computer Science, vol. 6184, pp. 537-543, 2010.
[14] W.-H. Tsai, "Moment-preserving thresholding: A new
approach,"Computer Vision Graphics, and Image Processing, vol. 29,
pp. 377-393, 1985.
[15] S.-C. Pei and C.-M. Cheng, "Color image processing by using binary
quaternion-moment-preserving thresholding technique," IEEE Trans.
Image Processing, vol. 8, no. 5, pp.614-628, 1999.