Special Issue: Information Security of Multimedia Contents

Image Tampering Recovery Based on Multi-codebook Vector Quantization

Expand
  • School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China

Received date: 2015-06-30

  Revised date: 2015-08-06

  Online published: 2015-11-30

Abstract

We propose a self-embedding fragile watermarking scheme to detect image tampering and recover original contents. By analyzing edge complexity of all non-overlapping blocks in the original image, the codebooks of vector quantization with different sizes are chosen to compress these blocks. The corresponding indicator and the index value representing the main content of the image block are collected to form the compression codes. They are duplicated to be used as reference-bits. These reference bits are then embedded into other multiple blocks according to secret keys, and authentication-bits are embedded into each block itself. Since the reference-bits based on multiple-codebook vector quantization have high efficiency in representing the image contents, the proposed scheme can achieve good performance of content recovery as compared to the reported methods. This is verified by experimental results.

Cite this article

JI Ping, QIN Chuan . Image Tampering Recovery Based on Multi-codebook Vector Quantization[J]. Journal of Applied Sciences, 2015 , 33(6) : 615 -627 . DOI: 10.3969/j.issn.0255-8297.2015.06.005

References

[1] Fridrich J, Goljan M. Images with self-correcting capabilities[C]//Proceedings of IEEE International Conference on Image Processing, 1999:792-796.

[2] Qian Z X, Feng G R. Inpainting assisted self-recovery with decreased embedding data[J]. IEEE Signal Processing Letters, 2010, 17(11):929-932.

[3] 马左红,华文深,李晓明,张悦.基于双随机相位加密技术的图像隐藏方法[J].光学仪器, 2012, 34(4):21-25. Ma Z H, Hua W S, Li X M, Zhang Y. Image hiding method based on double random phase encryption technology[J]. Optical Instruments, 2012, 34(4):21-25. (in Chinese)

[4] 付天舒,韩春杰,隋鑫.基于DCT变换的自适应图像水印实现[J].光学仪器, 2013, 35(3):51-57. Fu T S, Han C J, Sui X. Adaptive image watermark realization based on DCT transform[J]. Optical Instruments, 2013, 35(3):51-57. (in Chinese)

[5] 杨杉杉,秦川,徐伯庆.一种基于安全隐藏的图像分层篡改检测和内容恢复算法[J].计算机应用研究, 2015, 2:507-511. Yang S S, Qin C, Xu B Q. Fragile watermarking based on secure embedding for hierarchical tampering detection and content recovery[J]. Computer Application and Research, 2015, 2:507-511. (in Chinese)

[6] Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security[J]. Pattern Recognition Letters, 2004, 25(16):1893-1903.

[7] Walton S. Image authentication for a slippery new age[J]. Dr Dobb's Journal, 1995, 20(4):18-26.

[8] Chang C C, Hu Y S, Lu T C. A watermarking-based image ownership and tampering authentication scheme[J]. Pattern Recognition Letters, 2006, 27(5):439-446.

[9] He H J, Chen F, H. Tai M, Kalker T, Zhang J S. Performance analysis of a blockneighborhood-based self-recovery fragile watermarking scheme[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1):185-196.

[10] Qin C, Chang C C, Chen K N. Adaptive self-recovery for tampered images based on VQ indexing and inpainting[J]. Signal Processing, 2013, 93(4):933-946.

[11] Qin C, Chang C C, Chen P Y. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism[J]. Signal Processing, 2012, 92(4):1137-1150.

[12] Korus P, Dziech A. Adaptive self-embedding scheme with controlled reconstruction performance[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(2):169-181.

[13] Korus P, Dziech A. Efficient method for content reconstruction with self-embedding[J]. IEEE Transactions on Image Processing, 2013, 22(3):1134-1147.

[14] Lin P L, Hsieh C K, Huang P W. A hierarchical digital watermarking method for image tamper detection and recovery[J]. Pattern Recognition, 2005, 38(12):2519-2529.

[15] Lee T Y, Lin S D. Dual watermark for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(11):3497-3506.

[16] Zhang X P, Wang S Z, Qian Z X. Self-embedding watermark with flexible restoration quality[J]. Multimedia Tools and Applications, 2011, 54(2):385-395.

[17] Zhang X P, Wang S Z, QianZ X, Feng G R. Reference sharing mechanism for watermark self-embedding[J]. IEEE Transactions on Image Processing, 2011, 20(2):485-495.

[18] Yang C, Shen J. Recover the tampered image based on VQ indexing[J]. Signal Processing, 2010, 90(1):331-343.

[19] Gray R M. Vector quantization[J]. IEEE ASSP Magazine, 1984, 1(2):4-29.

[20] Linde Y, Buzo A, Gray R M. An algorithm for vector quantizer design[J]. IEEE Transactions on Communication, 1980, 28(1):84-95.

[21] Canny J. A computational approach to edge detection[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1986, 8(6):679-698.
Outlines

/