Abstract
The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Bravo-Solorio, S., & Nandi, A. K. (2011). Secure fragile watermarking method for image authentication with improved tampering localisation and self-recovery capabilities. Signal Processing, 91(4), 728–739. https://doi.org/10.1016/j.sigpro.2010.07.019.
Chan, C. S., & Chang, C. C. (2007). An efficient image authentication method based on Hamming code. Pattern Recognition, 40(2), 681–690. https://doi.org/10.1016/j.patcog.2006.05.018.
Chang, C. C., Hu, Y. S., & Lu, T. C. (2006). A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters, 27(5), 439–446. https://doi.org/10.1016/j.patrec.2005.09.006.
Chen, C. H., Tang, Y. L., & Hsieh, W. S. (2014). Color image authentication and recovery via adaptive encoding. In 2014 international symposium on computer, consumer and control (IS3C) (pp. 272–275). IEEE. https://doi.org/10.1109/IS3C.2014.79.
Cho, D. J. (2014). A study on performance evaluation-metrics for digital watermarking algorithms. Advanced Science and Technology letters, 78, 73–76. https://doi.org/10.14257/astl.2014.78.14.
Cox, I., Miller, M., Bloom, J., Fridrich, J., & Kalker, T. (2007). Digital watermarking and steganography. Morgan Kaufmann,. https://doi.org/10.1016/B978-012372585-1.50005-X.
Cox, I. J., Miller, M. L., & Bloom, J. A. (2000). Watermarking applications and their properties. In ITCC (p. 6). IEEE. https://doi.org/10.1109/ITCC.2000.844175.
CVG. (2014). CVG—UGR—image database. http://decsai.ugr.es/cvg/dbimagenes/. Accessed 12 Feb 2016.
Fridrich, J. (1998). Image watermarking for tamper detection. In Proceedings of international conference on image processing, 1998. ICIP 98 (Vol. 2, pp. 404–408). IEEE.
Haouzia, A., & Noumeir, R. (2008). Methods for image authentication: A survey. Multimedia Tools and Applications, 39(1), 1–46. https://doi.org/10.1007/s11042-007-0154-3.
Li, C., Wang, Y., Ma, B., & Zhang, Z. (2011). A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure. Computers & Electrical Engineering, 37(6), 927–940. https://doi.org/10.1016/j.compeleceng.2011.09.007.
Lin, C. H., Chen, T. H., & Chiu, C. W. (2013). Color image authentication with tamper detection and remedy based on BCH and Bayer pattern. Displays, 34(1), 59–68. https://doi.org/10.1016/j.displa.2012.11.004.
Lin, C. H., & Yang, C. Y. (2011). Multipurpose watermarking based on blind vector quantization (BVQ). Journal of Information Hiding and Multimedia Signal Processing, 2(2), 239–246.
Lin, C. Y., & Chang, S. F. (2001). A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology, 11(2), 153–168. https://doi.org/10.1109/76.905982.
Lin, H., Yang, S., & Xu, L. (2011). Watermark algorithm for color image authentication and restoration. In International conference on electronic and mechanical engineering and information technology (EMEIT), 2011 (Vol. 6, pp. 2773–2776). IEEE. https://doi.org/10.1109/EMEIT.2011.6023677.
Liu, K. C. (2012). Colour image watermarking for tamper proofing and pattern-based recovery. Image Processing, IET, 6(5), 445–454. https://doi.org/10.1049/iet-ipr.2011.0574.
Liu, S. H., Yao, H. X., Gao, W., & Liu, Y. L. (2007). An image fragile watermark scheme based on chaotic image pattern and pixel-pairs. Applied Mathematics and Computation, 185(2), 869–882. https://doi.org/10.1016/j.amc.2006.07.036.
Lo, C. C., & Hu, Y. C. (2014). A novel reversible image authentication scheme for digital images. Signal Processing, 98, 174–185. https://doi.org/10.1016/j.sigpro.2013.11.028.
Lu, Z. M., Xu, D. G., & Sun, S. H. (2005). Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Transactions on Image Processing, 14(6), 822–831. https://doi.org/10.1109/TIP.2005.847324.
Pei, S. C., & Tam, I. K. (2003). Effective color interpolation in CCD color filter arrays using signal correlation. IEEE Transactions on Circuits and Systems for Video Technology, 13(6), 503–513. https://doi.org/10.1109/TCSVT.2003.813422.
Phan, R. C. W. (2008). Tampering with a watermarking-based image authentication scheme. Pattern Recognition, 41(11), 3493–3496.
Podilchuk, C. I., & Delp, E. J. (2001). Digital watermarking: Algorithms and applications. Signal Processing Magazine, IEEE, 18(4), 33–46.
Qin, C., Chang, C. C., & Chen, P. Y. (2012). Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism. Signal Processing, 92(4), 1137–1150. https://doi.org/10.1016/j.sigpro.2011.11.013.
RajaRao, C., Boddu, M., & Mandal, S. K. (2015). Single sensor color filter array interpolation algorithms. In J. K. Mandal, S. C. Satapathy, M. Kumar Sanyal, P. P. Sarkar, & A. Mukhopadhyay (Eds.), Information systems design and intelligent applications (Vol. 340, pp. 295–307). Springer. https://doi.org/10.1007/978-81-322-2247-7_31.
Rey, C., & Dugelay, J. L. (2001). Un panorama des mthodes de tatouage permettant dassurer un service dintgrit pour les images. TS Traitement du Signal, 18(4), 283–295.
Rey, C., & Dugelay, J. L. (2002). A survey of watermarking algorithms for image authentication. EURASIP Journal on Advances in Signal Processing, 2002(6), 6–9. https://doi.org/10.1155/S1110865702204047.
Tiwari, A., & Sharma, M. (2012). Comparative evaluation of semi fragile watermarking algorithms for image authentication. Journal of Information Security, 3(3), 189. https://doi.org/10.4236/jis.2012.33023.
Voyatzis, G., & Pitas, I. (1996). Applications of Toral Automorphisms in image watermarking. In Proceedings of international conference on image processing, 1996 (Vol. 1, pp. 237–240). IEEE.
Wang, M. S., & Chen, W. C. (2007). A majority-voting based watermarking scheme for color image tamper detection and recovery. Computer Standards & Interfaces, 29(5), 561–570. https://doi.org/10.1016/j.csi.2006.11.009.
Wong, P. W., & Memon, N. (2001). Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing, 10(10), 1593–1601.
Wu, J., Timofte, R., & Van Gool, L. (2015). Efficient regression priors for post-processing demosaiced images. In IEEE international conference on image processing (ICIP), 2015 (pp. 3495–3499). IEEE. https://doi.org/10.1109/ICIP.2015.7351454.
Yang, C. W., & Shen, J. J. (2010). Recover the tampered image based on VQ indexing. Signal Processing, 90(1), 331–343. https://doi.org/10.1016/j.sigpro.2009.07.007.
Yu, M., Wang, J., Jiang, G., Peng, Z., Shao, F., & Luo, T. (2015). New fragile watermarking method for stereo image authentication with localization and recovery. AEU-International Journal of Electronics and Communications, 69(1), 361–370. https://doi.org/10.1016/j.aeue.2014.10.006.
Zhang, X., Wang, S., Qian, Z., & Feng, G. (2011). Reference sharing mechanism for watermark self-embedding. IEEE Transactions on Image Processing, 20(2), 485–495. https://doi.org/10.1109/TIP.2010.2066981.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Belferdi, W., Behloul, A. & Noui, L. A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidim Syst Sign Process 30, 1093–1112 (2019). https://doi.org/10.1007/s11045-018-0597-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11045-018-0597-x