Embedding robust labels into images for copyright protection
KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies
A Fragile Watermarking Scheme for Image Authentication with Localization and Recovery
ISMSE '04 Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
Cocktail watermarking for digital image protection
IEEE Transactions on Multimedia
The trustworthy digital camera: restoring credibility to the photographic image
IEEE Transactions on Consumer Electronics
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Recover the tampered image based on VQ indexing
Signal Processing
Fragile watermarking for color image recovery based on color filter array interpolation
WAIM'10 Proceedings of the 11th international conference on Web-age information management
Multimedia Tools and Applications
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
An image authentication method by applying Hamming code on rearranged bits
Pattern Recognition Letters
A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure
Computers and Electrical Engineering
Tamper-proof image watermarking using self-embedding
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics
Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras
Information Sciences: an International Journal
Self-recovery fragile watermarking scheme with variable watermark payload
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A novel reversible image authentication scheme for digital images
Signal Processing
Hi-index | 0.01 |
An effective dual watermark scheme for image tamper detection and recovery is proposed in this paper. In our algorithm, each block in the image contains watermark of other two blocks. That is to say, there are two copies of watermark for each non-overlapping block in the image. Therefore, we maintain two copies of watermark of the whole image and provide second chance for block recovery in case one copy is destroyed. A secret key, which is transmitted along with the watermarked image, and a public chaotic mixing algorithm are used to extract the watermark for tamper recovery. By using our algorithm, a 90% tampered image can be recovered to a dim yet still recognizable condition (PSNR ~20dB). Experimental results demonstrate that our algorithm is superior to the compared techniques, especially when the tampered area is large.