收稿日期: 2016-03-16
修回日期: 2016-05-01
网络出版日期: 2016-11-30
基金资助
国家自然科学基金(No.61303203);上海市自然科学基金(No.13ZR1428400);上海市教育委员会科研创新项目基金(No.14YZ087);上海智能家居大规模物联共性技术工程中心项目基金(No.GCZX14014);沪江基金(No.C14001,No.C14002)资助
Optimal Self-Embedding Scheme Based on Recovery-Data Sharing
Received date: 2016-03-16
Revised date: 2016-05-01
Online published: 2016-11-30
王慧丽, 秦川, 高丽萍, 陈庆奎 . 基于恢复信息共享机制的最优自嵌入算法[J]. 应用科学学报, 2016 , 34(6) : 677 -690 . DOI: 10.3969/j.issn.0255-8297.2016.06.004
This paper proposes a self-embedding fragile watermarking scheme for image tampering detection and recovery based on variable recovery-data sharing. The generated watermark bits in each image block are composed of recovery bits derived from the interleaved, and scrambled MSB bits of original image and authentication bits derived from the recovery bits and MSB bits. Different from the reported methods using a fixed embedding mode, the proposed scheme has two types of embedding modes, i.e., overlapping embedding and overlapping-free embedding, and uses variable numbers of MSB layers and recovery bits. One can choose an optimal embedding mode to achieve better quality of watermarked image and better performance of content recovery. Experimental results show flexibility and superiority of the scheme as compared with other reported methods.
[1] Fridrich J, Goljan M. Images with self-correcting capabilities [C]//Proceedings of IEEE International Conference on Image Processing,1999: 792-796.
[2] 付天舒,韩春杰,隋鑫. 基于DCT变换的自适应图像水印实现[J]. 光学仪器,2013, 35(3): 51-57. Fu T S, Han C J, SUI X. Adaptive image watermark realization based on DCT transform [J]. Optical Instruments, 2013, 35(3): 51-57. (in Chinese)
[3] Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001, 11(2): 153-168.
[4] Sun Q, Chang S F. A secure and robust signature scheme for JPEG2000 image authentication[J]. IEEE Transactions on Multimedia, 2005, 7(3): 480-494.
[5] Stallings W. Network security essentials: application and standards [M]. Upper Saddle River. NJ: Prentice-Hall, 2000.
[6] Vleeschouwer C D, Delaigle J F, Macq B. Invisibility and application functionalities in perceptual watermarking: an overview [J]. Proceedings of the IEEE, 2002, 90(1): 64-77.
[7] Walton S. Image authentication for a slippery new age [J]. Dr. Dobb's Journal, 1995, 20(4): 18-26.
[8] Zhang X, Wang S. Statistical fragile watermarking capable of locating individual tampered pixels [J]. IEEE Signal Processing Letters, 2007, 14(10): 727-730.
[9] Lin P L, Hsien C K, Huang P W. A hierarchical digital watermarking method for image tamper detection and recovery [J]. Pattern Recognition, 2005, 38(12): 2519-2529.
[10] Lee T Y, Lin S D. Dual watermark for image tamper detection and recovery [J]. Pattern Recognition, 2008, 41(15): 3497-3506.
[11] 黄良永. 一种图像篡改可恢复的认证水印方法[J]. 计算机工程,2011, 37(5): 175-178. Huang L Y. Restorable authentication watermark method for image tampering [J]. Computer Engineering, 2011, 37(5): 175-178. (in Chinese)
[12] Zhang X, Wang S, Qian Z, Feng G. Reference sharing mechanism for watermark selfembedding[J]. IEEE Transactions on Image Processing, 2011,20(2): 485-495.
[13] Yang C, Shen J. Recover the tampered image based on VQ indexing [J]. Signal Processing, 2010, 90(1): 331-343.
[14] Huo Y, He H, Chen F. Alterable-capacity fragile watermarking scheme with restoration capability[J]. Optics Communications, 2012, 285(7): 1759–1766.
[15] Yang S, Qin C, Qian Z, Xu B. Tampering detection and content recovery for digital image using halftone mechanism [C]// Proceedings of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,Kitakyushu,Japan, 2014: 130-133.
[16] 孙刘杰,庄松林. 印刷图像中隐藏水印的涅菲尔变换方法[J]. 上海理工大学学报,2008, 30(5): 475-478. Sun L J, Zhuang S L. Application of Fresnel holography to hiding watermark in printed image [J]. Journal of University of Shanghai for Science and Technology, 2008, 30(5): 475-478. (in Chinese)
[17] Schaefer G, Stich M. Ucid–an uncompressed color image database [C]//Proceedings of SPIE in Storage and Retrieval Methods and Applications for Multimedia,2004,5307(1): 472-480.
/
| 〈 |
|
〉 |