Structural digital signature for image authentication: an incidental distortion resistant scheme
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
Blind watermarking applied to image authentication
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
ICMCS '99 Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems - Volume 02
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Multipurpose watermarking for image authentication and protection
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
Combining copyright protection and data hiding: a sensitive transformation approach
ISCGAV'06 Proceedings of the 6th WSEAS International Conference on Signal Processing, Computational Geometry & Artificial Vision
Block-Chain Based Fragile Watermarking Scheme with Superior Localization
Information Hiding
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations
IEICE - Transactions on Information and Systems
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Fast copy-move forgery detection
WSEAS Transactions on Signal Processing
On the security of a fragile digital image watermarking scheme
GVE '07 Proceedings of the IASTED International Conference on Graphics and Visualization in Engineering
A remediable image authentication scheme based on feature extraction and clustered VQ
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
An efficient prediction-and-shifting embedding technique for high quality reversible data hiding
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
A secure fragile watermarking scheme based on chaos-and-hamming code
Journal of Systems and Software
A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure
Computers and Electrical Engineering
Computer Standards & Interfaces
Tamper-proof image watermarking using self-embedding
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
Self-recovery fragile watermarking scheme with variable watermark payload
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Counterfeiting attacks on block-wise dependent fragile watermarking schemes
Proceedings of the 6th International Conference on Security of Information and Networks
Self-embedding fragile watermarking scheme combined average with VQ encoding
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Data hiding by an improved exploiting modification direction
Multimedia Tools and Applications
Reversible data hiding for depth maps using the depth no-synthesis-error model
Information Sciences: an International Journal
Hi-index | 0.01 |
In this paper, we present an efficient and effective digital watermarking method for image tamper detection and recovery. Our method is efficient as it only uses simple operations such as parity check and comparison between average intensities. It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be ensured. That is, if a tampered block is not detected in level-1 inspection, it will be detected in level-2 or level-3 inspection with a probability of nearly 1. Our method is also very storage effective, as it only requires a secret key and a public chaotic mixing algorithm to recover a tampered image. The experimental results demonstrate that the precision of tamper detection and localization is 99.6% and 100% after level-2 and level-3 inspection, respectively. The tamper recovery rate is better than 93% for a less than half tampered image. As compared with the method in Celik et al. [IEEE Trans. Image Process. 11(6) (2002) 585], our method is not only as simple and as effective in tamper detection and localization, it also provides with the capability of tamper recovery by trading off the quality of the watermarked images about 5dB.