Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities
نویسندگان
چکیده
In this paper, we present a new fragile watermarking method aimed at providing improved tampering localisation and self-recovery capabilities. First, a secure blockwise mechanism, resilient to cropping, is used to localise distorted blocks of pixels. Subsequently, the tampering localisation accuracy is refined by means of an iterative pixel-wise mechanism, which estimates the original watermarked pixels in altered regions. Extensive tests, using a large data-set, are presented to show to what extent the size of the tampered area influences the performance of our method. Moreover, results show that the proposed scheme compares favourably with a method presented in recent literature, in terms of tampering localisation and self-recovery performance. In fact, we show that our method is capable of partially reconstructing a cover image when 5% of its total number of pixels has been cropped. & 2010 Elsevier B.V. All rights reserved.
منابع مشابه
A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering
This study presents an authentication method with self-recovery ability. The hidden watermark in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers the tampered portion. To increase the ability to recover from tampering, the recovery data are shared by using an (r, n) threshold scheme and then scattered all over the image. Experimental resu...
متن کاملA Semi-Fragile Watermarking Scheme for Color Image Authentication
In this paper, a semi-fragile watermarking scheme is proposed for color image authentication. In this particular scheme, the color image is first transformed from RGB to YST color space, suitable for watermarking the color media. Each channel is divided into 4×4 non-overlapping blocks and its each 2×2 sub-block is selected. The embedding space is created by setting the two LSBs of selected sub-...
متن کاملScalable fragile watermarking for image authentication
Semi-fragile watermarks are used to detect unauthorised changes to an image, whereas tolerating allowed changes such as compression. Most semi-fragile algorithms that tolerate compression assume that because compression only removes the less visually significant data from an image, tampering with any data that would normally be removed by compression cannot affect a meaningful change to the ima...
متن کاملA Fragile Watermarking Scheme for Color Image Authentication
In this paper, a fragile watermarking scheme is proposed for color image specified object’s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS T ⊥ , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-over...
متن کاملDual Domain Semi-fragile Watermarking for Image Authentication
Techniques to establish the authenticity and integrity of digital images are becoming increasingly essential for secure transacting. Ideally, the authentication algorithm should distinguish incidental integrity maintaining distortions such as lossy compression from malicious manipulations. This has motivated research into semi-fragile watermarking. A novel watermarking algorithm is proposed in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Signal Processing
دوره 91 شماره
صفحات -
تاریخ انتشار 2011