Reference Sharing Mechanism for Watermark Self-Embedding Abstract—This paper proposes two novel self-embedding watermarking schemes based upon a reference sharing mechanism, in which the watermark to be embedded is a reference derived from the original principal content in different regions and shared by these regions for content restoration. After identifying tampered blocks, both the reference data and the original content in the reserved area are used to recover the principal content in the tampered area. By using the first scheme, the original data in five most significant bit layers of a cover image can be recovered and the original watermarked image can also be retrieved when the content replacement is not too extensive. In the second scheme, the host content is decomposed into three levels, and the reference sharing methods with different restoration capabilities are employed to protect the data at different levels. Therefore, the lower the tampering rate, the more levels of content data are recovered, and the better the quality of restored results. I. INTRODUCTION PURPOSE of fragile watermarking is to achieve multimedia content authentication by imperceptibly embedding additional information into the host media [1], [2]. As some portion of digital content may be replaced with fake information by an adversary, a number of fragile watermarking schemes that can identify the modified areas and recover the original content have been developed for cover images in various formats, such as binary images [3], JPEG images [4] and uncompressed images [5]. One class of the fragile watermarking approaches is to divide a host image into small blocks, and embed the fragile watermark into these blocks. The watermark may be a hash of the principal content extracted from each block [6], [7]. Since image tampering destroys matching between the content and the watermark in the corresponding blocks, the tampered blocks can be revealed. In another class of the methods, i.e., pixel-wise fragilewatermarking schemes, data derived from the gray values of host pixels are used as the mark to be embedded into the host pixels themselves. REFERENCES [1] C. Vleeschouwer, J.-F. Delaigle, and B. Macq, “Invisibility and application functionalities in perceptual watermarking–An overview,” Proc. IEEE, vol. 90, no. 1, pp. 64–77, Jan. 2002. [2] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding–A survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999. [3] M.Wu and B. Liu, “Data hiding in binary image for authentication and annotation,” IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528–538, Apr. 2004. [4] X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible fragile watermarking for locating tampered blocks in JPEG images,” Signal Process., vol. 90, no. 12, pp. 3026–3036, 2010. [5] D. Kurdur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proc. IEEE, vol. 87, no. 7, pp. 1167–1180, Jul. 1999. [6] P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. Image Process., vol. 10, no. 10, pp. 1593–1601, Oct. 2001. [7] S. Suthaharan, “Fragile image watermarking using a gradient image for improved localization and security,” Pattern Recognit. Lett., vol. 25, pp. 1893–1903, 2004. [8] H. Lu, R. Shen, and F.-L. Chung, “Fragile watermarking scheme for image authentication,” Electron. Lett., vol. 39, no. 12, pp. 898–900, 2003. [9] H. He, J. Zhang, and H.-M. Tai, “Awavelet-based fragilewatermarking scheme for secure image authentication,” in Proc. 5th Int. Workshop Dig. Watermarking, 2006, vol. 4283, pp. 422– 432. [10] S.-H. Liu, H.-X. Yao, W. Gao, and Y.-L. Liu, “An image fragile watermark scheme based on chaotic image pattern and pixel-pairs,” Appl. Math. Comput., vol. 185, no. 2, pp. 869–882, 2007.