## Dual watermark for image tamper detection and recovery.(English)Zbl 1154.68399

Summary: An effective dual watermark scheme for image tamper detection and recovery is proposed in this paper. In our algorithm, each block in the image contains watermark of other two blocks. That is to say, there are two copies of watermark for each non-overlapping block in the image. Therefore, we maintain two copies of watermark of the whole image and provide second chance for block recovery in case one copy is destroyed. A secret key, which is transmitted along with the watermarked image, and a public chaotic mixing algorithm are used to extract the watermark for tamper recovery. By using our algorithm, a 90% tampered image can be recovered to a dim yet still recognizable condition (PSNR $$\approx$$ 20dB). Experimental results demonstrate that our algorithm is superior to the compared techniques, especially when the tampered area is large.

### MSC:

 68P25 Data encryption (aspects in computer science) 68U10 Computing methodologies for image processing

### Keywords:

dual watermark; tamper recovery; second chance; partner-block
Full Text:

### References:

 [1] Friedman, G.L., The trustworthy digital camera: restoring credibility to the photographic image, IEEE trans. consum. electron., 39, 905-910, (1993) [2] M.M. Yeung, F. Mintzer, An invisible watermarking technique for image verification, in: Proceedings of ICIP’ 97, Santa Barbara, California, 1997, pp. 680-683. [3] P.W. Wong, A watermark for image integrity and ownership verification, in: Proceedings of the IS&T PIC. Conference, Portland, USA, May 1998. [4] C.W. Wu, D. Coppersmith, F.C. Mintzer, C.P. Tresser, M.M. Yeung, Fragile imperceptible digital watermark with privacy control, in: Proceedings of the SPIE Security Watermarking Multimedia Contents, vol. 3657, 1999, pp. 79-84. [5] Kundur, D.; Hatzinakos, D., Digital watermarking for telltale tamper proofing and authentication, Proc. IEEE, 87, 7, 1167-1180, (1999) [6] Yu, G.J.; Lu, C.S.; Liao, H.Y.M., Mean quantization-based fragile watermarking for image authentication, Opt. eng., 40, 7, 1396-1408, (2001) [7] C.Y. Lin, S.F. Chang, Semi-fragile watermarking for authenticating JPEG visual content, in: SPIE International Conference on Security and Watermarking of Multimedia Contents II, vol. 3971, no. 13, EI ’00, San Jose, USA, January 2000. [8] J. Fridrich, A hybrid watermark for tamper detection in digital images, in: International Symposium on Signal Processing and Its Applications, vol 1, 1999, pp. 301-304. [9] J. Zhao, E. Koch, Embedding robust labels into images for copyright protection, in: Intellectual Property Rights New Technologies, Proceedings of KnowRight’95 Conference, 1995, pp. 242-251. [10] M.D. Swanson, B. Zhu, A.H. Tewfik, Robust data hiding for images, in: Proceedings of the IEEE Digital Signal Processing Workshop (DSP 96), Loen, Norway, September 1996, pp. 37-40. [11] Cox, I.J.; Kilian, J.; Leighton, T.; Shamoon, T., Secure spread spectrum watermarking for multimedia, IEEE trans. image process., 6, 1673-1687, (1997) [12] Lu, C.S.; Huang, S.K.; Sze, C.J.; Liao, H.Y.M., Cocktail watermarking for digital image protection, IEEE trans. multimedia, 2, 209-224, (2000) [13] K.-F. Li, T.-S. Chen, S.-C. Wu, Image tamper detection and recovery system based on discrete wavelet transform, in: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, vol. 1, August 2001, pp. 164-167. [14] P.-L. Lin, P.-W. Huang, A.-W. Peng, A fragile watermarking scheme for image authentication with localization and recovery, in: IEEE Sixth International Symposium on Multimedia Software Engineering, 13-15 December 2004, pp. 146-153. [15] Lin, P.-L.; Hsieh, C.-K.; Huang, P.-W., A hierarchical digital watermarking method for image tamper detection and recovery, Pattern recognition, 38, 2519-2529, (2005) [16] C.-L. Wang, R.-H. Hwang, T.-S. Chen, H.-Y. Lee, Detecting and restoring system of tampered image based on discrete wavelet transformation and block truncation coding, in: 19th International Conference on Advanced Information Networking and Applications, 2005.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.