Image tamper detection and self-recovery using multiple median watermarking

被引:18
|
作者
Rajput, Vishal [1 ]
Ansari, Irshad Ahmad [1 ]
机构
[1] PDPM Indian Inst Informat Technol Design & Mfg, Elect & Commun, Jabalpur, MP, India
关键词
Tamper detection; Self-recovery; Median watermarking; Image watermarking; Image security;
D O I
10.1007/s11042-019-07971-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Photographs play a very crucial role in our lives, be it in the field of forensic investigation, military intelligence, scientific research, and publications. Nowadays, most of these photographs are in the digital format; which can be easily edited in any photo editing software without requiring any special knowledge of the field. It has become quite hard to identify whether an image is real or fake. This can be very crucial in the cases of forensic investigation or authorization of images. So, we need a solution, which not only identifies the attacks from different schemes like collage attack, crop attack, etc. but also recovers the edited or tampered portion. In proposed work, 4 reduced-size copy of the original image is hidden in the original image's 4-LSB using four pseudo-random codes. Later on, these copies are used for tamper detection. As image gets tampered, recovery images (which are stored in the 4-LSB's of the original image) also get tampered. So, before recovering the edited portion using the median image (or one out of the four recovery images) various filters like median filters, sharpening filters, and noise removal filters are used to enhance the quality. The proposed scheme recovers the host better than the many recently proposed schemes.
引用
收藏
页码:35519 / 35535
页数:17
相关论文
共 50 条
  • [21] Self-recovery Fragile Watermarking based on Superior Block-wise Tamper Detection
    Li, Xiaoqiang
    Zhang, Huang
    Chen, Minhua
    PROCEEDINGS OF 2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (ICSP) VOLS 1-3, 2012, : 1697 - 1700
  • [22] Improved image tamper localisation using chaotic maps and self-recovery
    Sreenivas, K.
    Kamakshiprasad, V.
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2017, 49 : 164 - 176
  • [23] An image watermarking scheme with tamper detection and recovery
    Lin, Shineng D.
    Kuo, Yuchan
    Yao, Minghua
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2007, 3 (6A): : 1379 - 1387
  • [24] Medical image watermarking with tamper detection and recovery
    Zain, Jasni M.
    Fauzi, Abdul R. M.
    2006 28TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-15, 2006, : 655 - 658
  • [25] An image watermarking scheme with tamper detection and recovery
    Lin, Shinfeng D.
    Kuo, Yu-Chan
    Huang, Yu-Hsun
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 74 - +
  • [26] Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ
    Lin, Chia-Chen
    Lee, Ting-Lin
    Chang, Ya-Fen
    Shiu, Pei-Feng
    Zhang, Bohan
    ELECTRONICS, 2023, 12 (02)
  • [27] SVD based fragile watermarking scheme for tamper localization and self-recovery
    Ansari, Irshad Ahmad
    Pant, Millie
    Ahn, Chang Wook
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) : 1225 - 1239
  • [29] Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme
    Li, Chunlei
    Wang, Yunhong
    Ma, Bin
    Zhang, Zhaoxiang
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 367 - 379
  • [30] SVD based fragile watermarking scheme for tamper localization and self-recovery
    Irshad Ahmad Ansari
    Millie Pant
    Chang Wook Ahn
    International Journal of Machine Learning and Cybernetics, 2016, 7 : 1225 - 1239