Abstract
The provision of image tamper detection, localization and restoration forms an important requirement for modern multimedia and communication systems. A discrete wavelet transform (DWT)-based watermarking scheme for this purpose is proposed in this communication. In our scheme, the original image is first partitioned into blocks of size 2 × 2 in which a 1D DWT is applied to produce a watermark which is embedded in four disjoint partitions of the image to enhance the chance of restoration of the image from different cropping attack-based tampers. The validity and superiority of the proposed scheme is verified through extensive simulations using different images of two extensively used image databases.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Li, K.F., Chen, T.S., Wu, S.C.: Image tamper detection and recovery system based on discrete wavelet transformation. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 26–28 Aug 2001. doi:10.1109/PACRIM.2001.953548 (2001)
Gang-chui, S., Mi-mi, Z.: Novel fragile authentication watermark based on chaotic system. In: International Symposium on Industrial Electronics, 4–7 May 2004. doi:10.1109/ISIE.2004.1572034 (2004)
Chen, T.S., Chen, J., Chen, J.G.: Tamper detection and retrieval technique based on JPEG2000 with LL subband. In Proceedings of IEEE International Conference OD Networking, Sensing & Control, Taipei, Taiwan (2004)
Tsai, P., Hu, Y.C.: A watermarking-based authentication with malicious detection and recovery. In: 5th International Conference on Information, Communications and Signal Processing. doi:10.1109/ICICS.2005.1689172 (2005)
Tsai, M.J., Chien, C.C.: A wavelet-based semi-fragile watermarking with recovery mechanism. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008. doi:10.1109/ISCAS.2008.4542097 (2008)
Qi, X., Xin, X., Chang, R.: Image authentication and tamper detection using two complementary watermarks. In: 16th IEEE International Conference on Image Processing (ICIP). doi:10.1109/ICIP.2009.5413681 (2009)
Cruz, C., Mendoza, J.A., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Semi-fragile watermarking based image authentication with recovery capability. In: International Conference on Information Engineering and Computer Science. doi:10.1109/ICIECS.2009.5363496 (2009)
Wang, N., Kim, C.W.: Tamper detection and self-recovery algorithm of color image based on robust embedding of dual visual watermarks using DWT-SVD. In: 9th International Symposium on Communications and Information Technology. doi:10.1109/ISCIT.2009.5341268 (2009)
Yuping, H., Guangjun, G.: Watermarking-based authentication with recovery mechanism. In: 2nd International Workshop on Computer Science and Engineering. doi:10.1109/WCSE.2009.856 (2009)
Hui, L., Yuping, H.: A wavelet-based watermarking scheme with authentication and recovery mechanism. In: International Conference on Electrical and Control Engineering (ICECE). doi:10.1109/iCECE.2010.86 (2010)
Wang, L.J., Syue, M.Y.: Image authentication and recovery using wavelet-based multipurpose watermarking. In: 10th International Joint Conference on Computer Science and Software Engineering (JCSSE). doi:10.1109/JCSSE.2013.6567315 (2013)
Lee, T., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41, 3497–3506 (2008)
USC-SIPI image database: Available at http://sipi.usc.edu/database. Accessed on 1 Jan 2012
Computational Perception and Image Quality Lab, Oklahoma State University, www.vision.okstate.edu. Accessed on 1 Jan 2012
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this chapter
Cite this chapter
Som, S., Palit, S., Dey, K., Sarkar, D., Sarkar, J., Sarkar, K. (2015). A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and Restoration. In: Chaki, R., Saeed, K., Choudhury, S., Chaki, N. (eds) Applied Computation and Security Systems. Advances in Intelligent Systems and Computing, vol 305. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1988-0_2
Download citation
DOI: https://doi.org/10.1007/978-81-322-1988-0_2
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1987-3
Online ISBN: 978-81-322-1988-0
eBook Packages: EngineeringEngineering (R0)