Fragile Watermarking With Error-Free Restoration Capability
- 12 December 2008
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Multimedia
- Vol. 10 (8), 1490-1499
- https://doi.org/10.1109/tmm.2008.2007334
Abstract
This paper proposes a novel fragile watermarking scheme capable of perfectly recovering the original image from its tampered version. In the scheme, a tailor-made watermark consisting of reference-bits and check-bits is embedded into the host image using a lossless data hiding method. On the receiver side, by comparing the extracted and calculated check-bits, one can identify the tampered image-blocks. Then, the reliable reference-bits extracted from other blocks are used to exactly reconstruct the original image. Although content replacement may destroy a portion of the embedded watermark data, as long as the tampered area is not too extensive, the original image information can be restored without any error.Keywords
This publication has 26 references indexed in Scilit:
- A new semi-fragile image watermarking with robust tampering restoration using irregular samplingSignal Processing: Image Communication, 2007
- An image fragile watermark scheme based on chaotic image pattern and pixel-pairsApplied Mathematics and Computation, 2007
- Analysis and Design of Secure Watermark-Based Authentication SystemsIEEE Transactions on Information Forensics and Security, 2006
- Fragile image watermarking using a gradient image for improved localization and securityPattern Recognition Letters, 2004
- Reversible data embedding using a difference expansionIEEE Transactions on Circuits and Systems for Video Technology, 2003
- Circular interpretation of bijective transformations in lossless watermarking for media asset managementIEEE Transactions on Multimedia, 2003
- Invisibility and application functionalities in perceptual watermarking an overviewProceedings of the IEEE, 2002
- Secret and public key image watermarking schemes for image authentication and ownership verificationIEEE Transactions on Image Processing, 2001
- Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemesIEEE Transactions on Image Processing, 2000
- Information hiding-a surveyProceedings of the IEEE, 1999