A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections

Abstract

A fragile self-recovery watermarking scheme with simple and effective tamper detection capability is proposed in this paper. In conventional fragile watermark for tamper detection and recovery, the parity section of the watermark is used for tamper detection and the restoration section of the watermark is used for image recovery, separately. In addition, to provide second chance for block recovery in case one copy is destroyed, Lee and Lin proposed dual watermarking scheme in which two copies of restoration watermark are embedded. In the proposed new scheme, fragile watermark with one parity section and two restoration sections are embedded, too. In addition to the second chance for image restoration, the two restoration sections as well as the parity section are all used for tamper detection. Experimental results show that the tamper detection capability is superior to other techniques.

Share and Cite:

C. Wu and Y. Shih, "A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections," Optics and Photonics Journal, Vol. 3 No. 2B, 2013, pp. 103-107. doi: 10.4236/opj.2013.32B026.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] J. Fridrich, “Security of Fragile Authentication Water-Marks with Localization,” Proceedings of SPIE 4675, Security and Watermarking of Multimedia Contents IV, Vol. 691, 2002, pp. 691-700. doi:10.1117/12.465330
[2] H. J. He, F. Chen, H.-M. Tai, T. Kalker and Jiashu Zhang, “Performance Analysis of A Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme,” IEEE Transactions on Information Forensics and Security, Vol.7, No.1, 2012, pp.185-196. doi:10.1109/TIFS.2011.2162950
[3] T.-Y. Lee, S. F. Lin and D. Dual, “Watermark for Image Tamper Detection and Recovery,” Pattern Recognition, Vol.41, No.11, 2008, pp. 3497-3506. doi:10.1016/j.patcog.2008.05.003
[4] P. L. Lin, C.-K. Hsieh and P.-W. Huang, “A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery,” Pattern Recognition, Vol.38, No.12, 2005, pp. 2519-2529. doi:10.1016/j.patcog.2005.02.007
[5] M. Utku Celik, G. Sharma, E. Saber and A. Murat Tekalp, “Hierarchical Watermarking for Secure Image Authentication with Localization,” IEEE Transactions on Image Processing, Vol. 11, No.6, 2002, pp. 585-595. doi:10.1109/TIP.2002.1014990
[6] X. P. Zhang and S. Z. Wang, “Fragile Watermarking with Error-Free Restoration Capability,” IEEE Transactions on Multimedia, Vol.10, No.8, pp. 1490-1499, 2008. doi:10.1109/TMM.2008.2007334
[7] X. P. Zhang and S. Z. Wang, “Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels,” IEEE Signal Processing Letters, Vol.14, No.10, 2007, pp. 727-730.doi:10.1109/LSP.2007.896436

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.