Reference Sharing Mechanism for Watermark Self

advertisement
Reference Sharing Mechanism for Watermark Self-Embedding
Abstract—This paper proposes two novel self-embedding watermarking schemes based
upon a reference sharing mechanism, in which the watermark to be embedded is a
reference derived from the original principal content in different regions and shared by
these regions for content restoration. After identifying tampered blocks, both the reference
data and the original content in the reserved area are used to recover the principal content
in the tampered area. By using the first scheme, the original data in five most significant bit
layers of a cover image can be recovered and the original watermarked image can also be
retrieved when the content replacement is not too extensive. In the second scheme, the host
content is decomposed into three levels, and the reference sharing methods with different
restoration capabilities are employed to protect the data at different levels. Therefore, the
lower the tampering rate, the more levels of content data are recovered, and the better the
quality of restored results.
I. INTRODUCTION
PURPOSE of fragile watermarking is to achieve multimedia content authentication by
imperceptibly embedding additional information into the host media [1], [2]. As some portion of
digital content may be replaced with fake information by an adversary, a number of fragile
watermarking schemes that can identify the modified areas and recover the original content have
been developed for cover images in various formats, such as binary images [3], JPEG images [4]
and uncompressed images [5]. One class of the fragile watermarking approaches is to divide a
host image into small blocks, and embed the fragile watermark into these blocks. The watermark
may be a hash of the principal content extracted from each block [6], [7]. Since image tampering
destroys matching between the content and the watermark in the corresponding blocks, the
tampered blocks can be revealed. In another class of the methods, i.e., pixel-wise
fragilewatermarking schemes, data derived from the gray values of host pixels are used as the
mark to be embedded into the host pixels themselves.
REFERENCES
[1] C. Vleeschouwer, J.-F. Delaigle, and B. Macq, “Invisibility and application functionalities in
perceptual watermarking–An overview,” Proc. IEEE, vol. 90, no. 1, pp. 64–77, Jan. 2002.
[2] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding–A survey,” Proc.
IEEE, vol. 87, no. 7, pp. 1062–1078, Jul. 1999.
[3] M.Wu and B. Liu, “Data hiding in binary image for authentication and annotation,” IEEE
Trans. Multimedia, vol. 6, no. 4, pp. 528–538, Apr. 2004.
[4] X. Zhang, S. Wang, Z. Qian, and G. Feng, “Reversible fragile watermarking for locating
tampered blocks in JPEG images,” Signal Process., vol. 90, no. 12, pp. 3026–3036, 2010.
[5] D. Kurdur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and
authentication,” Proc. IEEE, vol. 87, no. 7, pp. 1167–1180, Jul. 1999.
[6] P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image
authentication and ownership verification,” IEEE Trans. Image Process., vol. 10, no. 10, pp.
1593–1601, Oct. 2001.
[7] S. Suthaharan, “Fragile image watermarking using a gradient image for improved localization
and security,” Pattern Recognit. Lett., vol. 25, pp. 1893–1903, 2004.
[8] H. Lu, R. Shen, and F.-L. Chung, “Fragile watermarking scheme for image authentication,”
Electron. Lett., vol. 39, no. 12, pp. 898–900, 2003.
[9] H. He, J. Zhang, and H.-M. Tai, “Awavelet-based fragilewatermarking scheme for secure
image authentication,” in Proc. 5th Int. Workshop Dig. Watermarking, 2006, vol. 4283, pp. 422–
432.
[10] S.-H. Liu, H.-X. Yao, W. Gao, and Y.-L. Liu, “An image fragile watermark scheme based
on chaotic image pattern and pixel-pairs,” Appl. Math. Comput., vol. 185, no. 2, pp. 869–882,
2007.
Download