[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Reversible Fragile Watermarking for Multichannel Images with High Redundancy Channels

Published: 01 September 2020 Publication History

Abstract

The paper presents a methodology to protect the integrity of multichannel images, having some highly redundant channels, by means of a reversible fragile watermarking algorithm. The watermark embedding phase uses a lossless compression method to compress the high redundancy channels, stores the compressed stream into their most significant bits, then embeds a secret fragile watermark by modifying the least significant bits of the high redundancy channels. In case the watermarked image is not modified, the host image can be perfectly reconstructed; otherwise, the modified area can be detected and located with very high probability and the area that has not been forged can be restored as in the original host image. The embedding of the watermark is performed by a Genetic Algorithm in the Karhunen-Loève Transform (KLT) domain: the use of a secret space defined by the KLT guarantees both security of the method and a high sensitivity in the detection of the forged areas.

References

[1]
Alattar AMReversible watermark using the difference expansion of a generalized integer transformIEEE Trans Image Process20041381147-11562091954
[2]
Aslantas V, Ozer S, and Ozturk S Improving the performance of DCT-based fragile watermarking using intelligent optimization algorithms Opt Commun 2009 282 14 2806-2817
[3]
Bandyopadhyay P, Das S, Chaudhuri A, Banerjee M (2012) A new invisible color image watermarking framework through Alpha Channel. International conference on advance in engineering, science and management p 302–308
[4]
Botta M, Cavagnino D, and Pomponiu V Protecting the content integrity of digital imagery with Fidelity preservation: an improved version ACM trans multimedia Comput Commun Appl 2014 10 3 29:1-29:5
[5]
Botta M, Cavagnino D, and Pomponiu V A modular framework for color image watermarking Signal Process 2016 119 102-114
[6]
Chaumont M, Puech W (2009) A High Capacity Reversible Watermarking Scheme Proceedings of SPIE 7257
[7]
Dworkin MJ (2015) SHA-3 standard: permutation-based hash and extendable-output functions. NIST FIPS – 202
[8]
Goldberg DE (1989) Genetic algorithms in search, Optimization and Machine Learning. Addison-Wesley Longman Publishing Co.
[9]
Gonzalez RC, Wintz P (1987) Digital image processing 2nd ed. Addison-Wesley Publishing Company
[10]
Hassanien A-E, Abraham A, Kacprzyk J, and Peters JF Computational intelligence in multimedia processing: foundation and trends Studies in Computational Intelligence 2008 96 3-49
[11]
Kim KS, Lee MJ, Lee HY, and Lee HK Reversible data hiding exploiting spatial correlation between sub-sampled images Pattern Recogn 2009 42 11 3083-3096
[12]
Lee C-H and Tsai W-HA secret-sharing-based method for authentication of Grayscale document images via the use of the PNG image with a data repair capabilityIEEE Trans Image Process2012211207-2182918966
[13]
Lee C-H and Tsai W-H A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding Signal Process 2013 93 7 2010-2025
[14]
Lin P-Y, Lee J-S, and Chang C-C Protecting the content integrity of digital imagery with Fidelity preservation ACM trans multimedia Comput Commun Appl 2011 7 3 15:1-15:20
[15]
Lin C-C, Tai W-L, and Chang C-C Multilevel reversible data hiding based on histogram modification of difference images Pattern Recogn 2008 41 12 3582-3591
[16]
Luo L, Chen Z, Chen M, Zeng X, and Xiong Z Reversible image watermarking using interpolation technique IEEE Transactions on Information Forensics and Security 2010 5 1 16-21
[17]
Naskar R and Chakraborty RS A generalized tamper localization approach for reversible watermarking algorithms ACM trans multimedia Comput Commun Appl 2013 9 3 19:1-19:22
[18]
Oktavia V and Lee W-H A fragile watermarking technique for image authentication using singular value decomposition Advances in Multimedia Information Processing LNCS 2004 3332 42-49
[19]
Qian Z, Feng G, Zhang X, and Wang S Image self-embedding with high-quality restoration capability Digital Signal Process 2011 21 2 278-286
[20]
Singh D and Singh SK DCT based efficient fragile watermarking scheme for image authentication and restoration Multimed Tools Appl 2017 76 1 953-977
[22]
Telegram.org Available online: https://telegram.org/blog/moar-stickers (accessed on September 2018)
[23]
Tian J Reversible data embedding using a difference expansion IEEE Transactions on Circuits and Systems for Video Technology 2003 13 8 890-896
[24]
Wang R-Z, Lin C-F, and Lin J-C Image hiding by optimal LSB substitution and genetic algorithm Pattern Recogn 2001 34 3 671-683
[25]
Zhang X, Qian Z, Ren Y, and Feng G Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction IEEE Trans Inf Forensics Secur 2011 6 4 1223-1232
[26]
Zhang X, Wang S, Qian Z, and Feng G Self-embedding watermark with flexible restoration quality Multimed Tools Appl 2011 54 2 385-395
[27]
Zhang X, Wang S, Qian Z, and Feng GReference sharing mechanism for watermark self-embeddingIEEE Trans Image Process2011202485-4952767659
[28]
Zhang XP, Xiao YY, and Zhao ZM Self-embedding fragile watermarking based on DCT and fast fractal coding Multimed Tools Appl 2015 74 15 5767-5786

Cited By

View all
  • (2023)FRRWJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10169835:8Online publication date: 1-Sep-2023
  • (2022)Fragile Watermarking Based on QR Decomposition and Fourier TransformWireless Personal Communications: An International Journal10.1007/s11277-021-08895-1122:1(211-227)Online publication date: 1-Jan-2022

Index Terms

  1. Reversible Fragile Watermarking for Multichannel Images with High Redundancy Channels
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Please enable JavaScript to view thecomments powered by Disqus.

              Information & Contributors

              Information

              Published In

              cover image Multimedia Tools and Applications
              Multimedia Tools and Applications  Volume 79, Issue 35-36
              Sep 2020
              1577 pages

              Publisher

              Kluwer Academic Publishers

              United States

              Publication History

              Published: 01 September 2020
              Accepted: 22 April 2020
              Revision received: 13 March 2020
              Received: 13 September 2018

              Author Tags

              1. Reversible watermarking
              2. Fragile watermarking
              3. Multichannel image processing
              4. Image authentication
              5. Genetic algorithm
              6. Karhunen-Loève Transform

              Qualifiers

              • Research-article

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 05 Jan 2025

              Other Metrics

              Citations

              Cited By

              View all
              • (2023)FRRWJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10169835:8Online publication date: 1-Sep-2023
              • (2022)Fragile Watermarking Based on QR Decomposition and Fourier TransformWireless Personal Communications: An International Journal10.1007/s11277-021-08895-1122:1(211-227)Online publication date: 1-Jan-2022

              View Options

              View options

              Media

              Figures

              Other

              Tables

              Share

              Share

              Share this Publication link

              Share on social media