SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Pattern Recognition 38 (2005) 2519 – 2529
                                                                                                       www.elsevier.com/locate/patcog



      A hierarchical digital watermarking method for image tamper
                        detection and recoveryଁ
                          Phen Lan Lina,∗ , Chung-Kai Hsiehb , Po-Whei Huangb
           a Department of Computer Science and Information Engineering, Providence University, Shalu, Taichung 433, Taiwan
                         b Department of Computer Science, National Chung Hsing University, Taichung, Taiwan


                   Received 2 December 2003; received in revised form 21 February 2005; accepted 21 February 2005




Abstract
   In this paper, we present an efficient and effective digital watermarking method for image tamper detection and recovery.
Our method is efficient as it only uses simple operations such as parity check and comparison between average intensities.
It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be
ensured. That is, if a tampered block is not detected in level-1 inspection, it will be detected in level-2 or level-3 inspection
with a probability of nearly 1. Our method is also very storage effective, as it only requires a secret key and a public chaotic
mixing algorithm to recover a tampered image. The experimental results demonstrate that the precision of tamper detection
and localization is 99.6% and 100% after level-2 and level-3 inspection, respectively. The tamper recovery rate is better than
93% for a less than half tampered image. As compared with the method in Celik et al. [IEEE Trans. Image Process. 11(6)
(2002) 585], our method is not only as simple and as effective in tamper detection and localization, it also provides with the
capability of tamper recovery by trading off the quality of the watermarked images about 5 dB.
᭧ 2005 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
Keywords: Image authentication; Tamper detection; Tamper localization; Digital watermarking




1. Introduction                                                        to the image and verify the received image by comparing
                                                                       its signature to the signature attached to it. The signature
   Since the past decade, there has been a rapid growth in             can be either an encrypted or a signed hash value of image
using digital multimedia data. The flourish of PC with the              contents or image characteristics (e.g., edges, histograms,
wideband Internet connections has made the distribution of             moments, etc.) [5]. These mechanisms can detect if an image
multimedia data much easier and faster. On the other hand,             has been changed; however, they cannot locate where the
the wide availability of powerful image processing tools has           image was changed. Besides, the attached signature requires
also made imperceptible image modifications possible. As                additional bandwidth or storage that may not always be
a result, image authenticity becomes greatly threatened.               available. To solve these problems, many researchers have
   Classical image authentication mechanisms [1–4], some-              proposed watermarking for image authentication [6–17].
times called tamper-proofing mechanisms, attach a signature                Based on the functionality, Vleeschouwer et al. [18] clas-
                                                                       sified the image authentication watermarking techniques
  ଁ This research is supported by National Science Council of          into three categories: (1) fragile watermarking, which detects
ROC under Grant NSC-92-2213-E-126-009.                                 any modification to the image [7,11–13,19]; (2) semi-fragile
  ∗ Corresponding author. Tel.: +886-4-632-8001x3409;                  watermarking, which detects and localizes the modifications
fax: +886-4-632-4045.                                                  to the contents [6–8]; (3) content-based fragile watermark-
    E-mail address: lan@pu.edu.tw (P.L. Lin).                          ing, which detects only the significant changes in the image

0031-3203/$30.00 ᭧ 2005 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
doi:10.1016/j.patcog.2005.02.007
2520                                   P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529

while permitting content-preserving processing such as cod-            2.1. VQ counterfeiting attacks
ing and scanning [2,10]. In Ref. [20], the above categories
(1) and (2) are combined as fragile watermarking, whereas                 Holliman and Memon [25] presented a counterfeiting at-
category (3) is named as semi-fragile watermarking. Some               tack on block-wise independent watermarking schemes. In
examples of these schemes are presented in Refs. [21–24].              such an attack, the attacker is able to create a counterfeit im-
In this paper, we adopt the definitions of fragile and semi-            age by using a collage of watermarked blocks selected from
fragile watermarking presented in Ref. [20].                           a large database. Because block-wise independent schemes
   Wong [12] proposed a public-key fragile watermark-                  validate the watermark of each individual block and the wa-
ing scheme that embeds a digital signature of each block               termark of each block comprises only the information of the
within the image into the least significant bits of the same            block itself, the counterfeit image generated from the VQ
block. However, Holliman and Memon [25] soon presented                 codebook can easily pass the authentication test of block-
a vector quantization (VQ) counterfeiting attack that can              wise independent schemes.
construct a counterfeit image from a VQ codebook gen-
erated from a set of watermarked images. To solve the                  2.2. Torus automorphism
problem of VQ counterfeiting attack, several enhanced
algorithms were proposed [7,25,27]. Nonetheless, they                     Torus automorphism is a kind of dynamic system. Briefly
either fail to effectively address the problem or sacrifice             speaking, a dynamic system is a system whose states change
tamper localization accuracy of the original methods [20].             with time t. When t is discrete, a dynamic system can be
Celik et al. then presented an algorithm based on Wong’s               presented as an iteration of a function f, i.e., St+1 = f (St ),
scheme and demonstrated that their algorithm can thwart                t ∈ Z = {0, 1, 2, . . .}, St , St+1 are the states at time t and
the VQ codebook attack while sustaining the localization               t + 1, respectively. A two-dimensional Torus automorphism
property [20].                                                         can be considered as a permutation function or a spatial
   In this paper, we present an efficient and effective dig-            transformation of a plane region. This transformation can be
ital watermarking method for image tamper detection and                performed using a 2 × 2 matrix A with constant elements.
recovery. Our method is efficient as it only uses simple op-            More specifically, a state St+1 or a point (xi+1 , yi+1 ) can be
erations such as parity check and comparison between av-               transformed from another state St or another point (xi , yi )
erage intensities. It is effective because the scheme inspects         by
the image hierarchically with the inspection view increases
                                                                               a1   a2          xi+1              xi
along with the hierarchy so that the accuracy of tamper lo-            A=                 ,                 =A×             mod N,    (1)
                                                                               a3   a4          yi+1              yi
calization can be ensured. That is, if a tampered block is not
detected in level-1 inspection, it will be detected in level-          where ai ∈ Z, |A| (the determinant of A) =1, and A has
2 or level-3 inspection with a probability of nearly 1. Our            eigenvalues 1,2 ∈ R − {−1, 0, 1}, R is the set of rational
method is also very storage effective, as it only requires a se-       numbers. The detailed characteristics of A are described in
cret key and a public chaotic mixing algorithm to recover the          Refs. [26,28]. A set of successive points {S0 , S1 , S2 , . . .},
tampered areas. The experimental results demonstrate that              generated by Eq. (1), composes an orbit ϑ of the system and
the precision of tamper detection and localization is close to         the initial point S0 =(x0 , y0 ) classifies ϑ into two categories.
100% after level-2 inspection and the tamper recovery rate             When x0 and/or y0 are irrational, ϑ is infinite. When both
is better than 93% for a less than half tampered image. As             x0 and y0 are rational, ϑ is chaotic and periodic at every R
compared with the method in Ref. [20], our method is not               times, i.e., SR = S0 . R is called the “recurrence time”.
only as simple and as effective in tamper detection and lo-               Voyatzis and Pitas [26] presented a one-parameter, two-
calization, it also provides with the capability of tamper re-         dimensional, discrete Torus automorphism, shown in Eq.
covery by trading off the quality of the watermarked images            (2), for creating a unique and random mapping of the pixels
about 5 dB.                                                            within an image:
   The remainder of this paper is organized as follows. In
                                                                               1     1               xi+1              xi
Section 2, we briefly describe VQ counterfeiting attacks and            A=               ,                   =A×              mod N,   (2)
Torus automorphism. Our proposed watermarking scheme is                        k    k+1              yi+1              yi
presented in Section 3. In Sections 4 and 5, we demonstrate            where (xi , yi ) ∈ [0, N − 1] × [0, N − 1] and k ∈ [0, N − 1].
the experimental results and analyze the performance of                The recurrence time R depends upon the parameters k, N,
our scheme. Finally, the concluding remarks are given in               and the initial point (x0 , y0 ). In most cases, R is equal to
Section 6.                                                             N − 1 or N + 1, when N is prime [26,28].


2. Backgrounds                                                         3. The proposed scheme

   In this section, we briefly describe both vector quantiza-              Our proposed scheme can perform both tamper detec-
tion (VQ) counterfeiting attacks and Torus automorphism.               tion and recovery for tampered images. While tamper detec-
P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529                              2521

Table 1
The mapping of blocks using Eq. (3) with k = 37, 6, and N = 64

k      X           1         2         3         4          5         6         7           8        33      34      35        36
       (x, y)      (0,0)     (0,1)     (0,2)     (0,3)      (0,4)     (0,5)     (0,6)       (0,7)    (4,0)   (4,1)   (4,2)     (4,3)


37     X           38        11        48        21         58        31        4           41       6       43      16        53
       (x , y )    (4,5)     (1,2),    (5,7)     (2,4)      (7,1)     (3,6)     (0,3)       (5,0)    (0,5)   (5,2)   (1,7)     (6,4)


6      X           7         13        19        25         31        37        43          49       7       13      19        25
       (x , y )    (0,6)     (1,4)     (2,2)     (3,0)      (3,6)     (4,4)     (5,2)       (6,0)    (0,6)   (1,4)   (2,2)     (3,0)




tion is achieved through a simple, block-based, three-level           2. Assign a unique and consecutive integer X ∈ {0, 1, 2,
inspection of in-block information only, the recovery of a               . . . , N − 1} to each block from left to right and top to
tampered block relies on its feature information hidden in               bottom, where N = (M/4) × (M/4).
another block that can be determined by a one-dimensional             3. Randomly pick a prime number k ∈ [1, N − 1].
transformation similar to Torus automorphism, as described            4. For each block number X, apply Eq. (3) to obtain X , the
in Section 2. Our scheme can be best described through the               number of its mapping block.
following three stages: watermark embedding, tamper de-               5. Record all pairs of X and X to form the block mapping
tection, and tampered image recovery.                                    sequence.
                                                                         Note that the secret key k must be a prime in order to
3.1. Block-based watermark embedding                                  obtain a one-to-one mapping; otherwise, the period is less
                                                                      than N and a many-to-one mapping may occur. Table 1
   We describe the watermark-embedding procedure in this              lists some portions of the mapping sequence generated with
section. Each image is of size M × M pixels, where M is               N = 64, k = 37 and 6, respectively. In this table, X starts
assumed to be a multiple of four and the number of gray-              to repeat at X = 33 when k = 6, which is not a prime.
levels is 256.
                                                                      3.1.3. Block watermark embedding
3.1.1. Preparation                                                       For each block B of 4 × 4 pixels, we further divide it into
   We need to prepare a block-mapping sequence A → B →                four sub-blocks of 2 × 2 pixels, as shown in Fig. 1. The wa-
C → D → · · · → A for watermark embedding, where each                 termark in each sub-block is a 3-tuple (v, p, r), where both
symbol denotes an individual block. The intensity feature             v and p are 1-bit authentication watermark, and r is a 6-bit
of block A will be embedded in block B, and the intensity             recovery watermark for the corresponding sub-block within
feature of block B will be embedded in block C, etc.                  block A mapped to B. The following algorithm describes
   Since the number of blocks in each dimension of most               how the 3-tuple watermark of each sub-block is generated
images can hardly be a prime number, we cannot obtain a               and embedded.
one-to-one mapping among the blocks by applying Eq. (2),
based on the analysis in Ref. [26]. Instead, we use a 1-D             3.1.4. Sub-block watermark generation and embedding
transformation as shown in Eq. (3) to obtain a one-to-one             algorithm
mapping sequence.
                                                                      1. Set the two LSBs of each pixel within the block to zero
                                                                         and compute the average intensity of the block and each
X = [f (X) = (k × X) mod N] + 1,                            (3)
                                                                         of its four sub-blocks, denoted by avg_B and avg_Bs ,
                                                                         respectively.
where X , X (∈ [0, N − 1]) are the block number, k (a prime
                                                                      2. Generate the authentication watermark v of each sub-
and ∈ [0, N − 1]) is a secret key, and N (∈ Z − {0}) is the
                                                                         block as in Eq. (4) below:
total number of blocks in the image.
   The generation algorithm of the block-mapping sequence                        1   if avg_Bs avg_B,
is as follows.                                                            v=                                                    (4)
                                                                                 0   otherwise.

                                                                      3. Generate the parity-check bit p of each sub-block as in
3.1.2. Block mapping sequence generation algorithm
                                                                         Eq. (5) below:
1. Divide the image into non-overlapping blocks of 4 × 4                         1      if num is odd,
                                                                          p=                                                    (5)
   pixels.                                                                       0      otherwise,
2522                                          P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529



                           1       3     9       11
                                                             avg_As
                           2       4     10      12
                                                             = (I1+I2+I3+I4)/4
                           5       7     13      15
                           6       8     14      16

                               (a) Block A and one of its sub-block      a1      a2       a3     a4    a5     a6   a7       a8


                                                                                      r        (c) The six MSBs of avg_As


                                                                                  1        3      9      11
                                                        v ` p of B
                                                                                  2        4      10     12
                                                                                  5        7      13    15
                                                                                  6        8      14    16

                                                                                   (b) Block B and one of its sub-block

Fig. 1. Watermark generation procedure for the sub-block comprising pixels 1,2,3,4: (a) Block A and one of its sub-block; (b) block B and
one of its sub-block; (c) the six MSBs of avg_A.


            bit 1    2     3      4       5       6      7     8                 For each block, denoted as B , we first set the two LSBs of
 pixel 1                                                                         each pixel in B to zero and compute its average intensity,
                                                         v     r
                                                                                 denoted as avg_B . We then perform 3-level hierarchical
 pixel 2                                                 p     r                 detection. In level-1 detection, we check each 2 × 2 sub-
 pixel 3                                                 r     r                 block within one block. In level-2 detection, we treat a 4 × 4
 pixel 4                                                 r     r                 block as one unit. Finally, we check the block by extending
                                                                                 the inspection view to its 3×3 block-neighborhood in level-3
                    Original image data               Embedding data             detection. Level-4 detection is for VQ-attack resiliency only.
                                                                                 The procedure of our hierarchical tamper detection scheme
Fig. 2. The 8-bit Watermark (v, p, r) embedded in pixels 1,2,3,4.                is described in the following.

     where num is the total number of 1s in the six MSBs of
     avg_Bs .                                                                    3.2.1. Hierarchical tamper detection algorithm
4.   From the mapping sequence generated in the preparation                         Level-1 detection. For each sub-block Bs of 2 × 2 pixels
     step, obtain block A whose recovery information will be                     within block B , perform the following steps:
     stored in block B.
5.   Compute the average intensity of each corresponding                         1. Extract v and p from Bs .
     sub-block As within A, as shown in Fig. 1(a), and denote                    2. Set the two LSBs of each pixel within each Bs to zero
     it avg_As .                                                                    and compute the average intensity for each sub-block Bs ,
6.   Obtain the recovery intensity r of As by truncating the                        denoted as avg_Bs .
     two LSBs in avg_As , as shown in Fig. 1(c).                                 3. Count the total number of 1s in avg_Bs and denote it Ns .
7.   Embed the 3-tuple-watermark (v, p, r), eight bits in all,                   4. Set the parity-check bit p of Bs to 1 if Ns is odd;
     onto the two LSBs of each pixel within Bs , as shown in                        otherwise, set it to 0.
     Fig. 2.                                                                     5. Compare p with p. If they are not equal, mark Bs erro-
                                                                                    neous and complete the detection for Bs .
   The watermark generation procedure for the sub-block                          6. Set the algebraic relation v = 1 if avg_Bs > = avg_B ;
comprising pixels 1, 2, 3, and 4 is illustrated in Fig. 1. How                      otherwise, set v = 0.
the 8-bit (v, p, r) are embedded in these four pixels is shown                   7. Compare v with v. If they are not equal, mark Bs er-
in Fig. 2.                                                                          roneous and complete the detection for Bs ; otherwise,
                                                                                    mark it valid.
3.2. Block-based hierarchical tamper detection
                                                                                    Level-2 detection. For each block of size 4 × 4 pixels,
  The test image is first divided into non-overlapping blocks                     mark this block erroneous if any of its sub-block is marked
of 4 × 4 pixels, as in the watermark embedding process.                          erroneous; otherwise, mark it valid.
P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529                             2523

                                                                      5. Pad the 6-bit-intensity with two 0s to the end and replace
                                                                         the intensity of each pixel within the sub-block with this
                Error        B         Error                             new 8-bit intensity.
                Error       Error      Error                          6. Repeat step 5 for all four sub-blocks within block B and
                                                                         mark block B valid.
       Fig. 3. The 3 × 3 block-neighborhood of block B.

                                                                      4. Experimental results
   Level-3 detection. For each valid block of size 4×4 pixels,
mark the block erroneous if there are five or more erroneous             We conduct three experiments to test the performance of
blocks in its 3 × 3 block-neighborhood, as shown in Fig. 3.           our proposed scheme on both tamper detection and tampered
   Level-4 detection (only required for resisting against VQ          image restoration.
attack). For each valid block B of size 4×4 pixels, perform
the following steps:                                                  4.1. Performance on images with slight to median degree
1. Find the block number of block C using secret key k                of tampering
   and Eq. (3). Note that block C is the one in which the
   intensity feature of block B is embedded.                             We use four images: Home, Car, Fingerprint, and Beach,
2. Locate block C.                                                    as shown in Figs. 4(a)–7(a), for this experiment. All are of
3. If block C is marked erroneous, assume block B is cor-             size 256 × 256 pixels. The experiments and their respective
   rect and complete the test for block B .                           results are described in the following.
4. If block C is valid, perform the following steps:                     (a) The number on the doorplate in the watermarked
                                                                      Home has been modified, as shown in Fig. 4(b). The size
  (a) Obtain the 6-bit should-be intensity of each Bs by              of the modification is about 4 × 12. Fig. 4(c) shows the
      firstly extracting the two LSBs from each pixel in               detected tamper area using level-1 detection, and Fig. 4(d)
      the corresponding sub-block within block C then dis-            shows the recovered Home.
      carding the bits for v, p and padding two 0s to the                (b) The number on the license plate in the watermarked
      end to make an 8-bit value, denoted as avg_B1s .                Car has been wiped out, as shown in Fig. 5(b). The size of
  (b) Compute the average intensity of each Bs with the               the modification is about 68 × 20. Figs. 5(c) and (e) show
      two LSBs of each pixel set to zero beforehand and               the detected tamper area using hierarchical level-1 and -2
      denote it avg_Bs .                                              inspections, and Figs. 5(d) and (f) show the recovered Car,
  (c) Compare avg_Bs with avg_B1s and mark B erro-                    respectively.
      neous if they are different.                                       (c) The watermarked Fingerprint, as shown in Fig. 6(a),
                                                                      has been slightly and randomly modified, as shown in
3.3. Block-based tampered image recovery

   After the detection stage, all the blocks are marked ei-
ther valid or erroneous. We only need to recover the erro-
neous blocks and leave those valid blocks as they are. The
restoration procedure for each erroneous block is described
as follows.
   For convenience of description, we call the erroneous
block under recovery block B and the block embedded with
its intensity block C.

3.3.1. Block recovery algorithm

1. Calculate the block number for block C using secret key
   k and Eq. (3).
2. Locate block C.
3. If block C is marked erroneous, skip the recovery for this
   block.
4. If block C is valid, obtain the 6-bit-intensity of each sub-
   block within block B by firstly extracting the two LSBs
   from each pixel in the corresponding sub-block within              Fig. 4. (a) The watermarked Home; (b) tampered Home; (c) de-
   block C then discarding the bits v and p.                          tected erroneous region; (d) recovered Home.
2524                                    P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529




Fig. 5. (a) The watermarked Car; (b) tampered Car; (c,e) detected
erroneous region; (d,f) recovered Car.




                                                                        Fig. 7. The watermarked Beach; (b) tampered Beach; (c,e,g) de-
                                                                        tected erroneous regions; (d,f,h) recovered Beaches.



                                                                        8 × 8 pixels. Figs. 6(d) and (f) show the recovered Finger-
                                                                        prints, respectively.
                                                                           (d) The watermarked Beach, as shown in Fig. 7(a), has
                                                                        been inserted with a deer, as shown in Fig. 7(b). The modifi-
                                                                        cation is so natural that one can hardly suspect any changes
                                                                        that had been made to this picture. Using our method, we
                                                                        can detect the modification, as shown in Figs. 7(c), (e), and
                                                                        (g) with only level-1, both level-1 and -2, or all three lev-
                                                                        els of detection, respectively. The size of the modification
                                                                        is about 68 × 68 pixels. Figs. 7(d), (f), and (h) show the
                                                                        recovered Beaches, respectively.

                                                                        4.2. Performance of tamper detection on 100% tampered
                                                                        images
Fig. 6. (a) The watermarked Fingerprint; (b) tampered Fingerprint;
(c,e) detected erroneous regions; (d,f) recovered Fingerprints.           We test the tamper detection capability for large tam-
                                                                        pered area with image Lena, as shown in Fig. 8(a). All
Fig. 6(b). Comparing Figs. 6(a) with (b), we can hardly dif-            blocks in image Lena are 100% altered by the four following
ferentiate one from the other. Using our method, we can                 methods.
detect the modifications, as shown in Figs. 6(c) and (e) with
only level-1 detection, or both level-1 and -2 detections, re-             M1: Covering the whole image with leaf patterns, as de-
spectively. The size of the smallest modification is about                      picted in Fig. 8(b).
P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529                             2525




Fig. 8. (a) Unaltered image; (b–e) All blocks in (a) are 100%
altered by method M1–M4, respectively.


Table 2
The miss detection rates after each level of inspection

Image        Home          Car           Fingerprint      Beach

Level-1       11.62%       10.58%        11.84%           11.56%
Level-2       0.35%        0.37%         0.32%            0.34%
Level-3       0%           0%            0%               0%



   M2: Covering the whole image with another image, as
       depicted in Fig. 8(c).
   M3: Covering the whole image with fruit patterns, as
       depicted in Fig. 8(d).
   M4: Spreading plenty of mist to the whole image, as
       depicted in Fig. 8(e).

   The test results are listed in Table 2 and summarized as
follows:
   (a) With only level-1 detection, the maximum rate of miss
detection is less than 12%.                                              Fig. 9. 10–50% Tampered Lena with two types of tampering dis-
   (b) With both level-1 and level-2 detections, the maximum             tribution: single-tampered-chunk and spread-tampered-blocks.
miss detection rate drops significantly to 0.37%.
   (c) With level-1, -2, and -3 detections, all tampered blocks
are detected.
                                                                            (a) The recovering rate for single-tampered images is bet-
4.3. Performance of restoration on distribution of                       ter than 99% when the rate of tampering is less than 16%, is
tampered blocks                                                          about 94% when the rate of tampering is 40%, and is about
                                                                         93% when the rate of tampering increases to 50%.
   In this experiment, we want to find out how well a tam-                   (b) The recovering rate for spread-tampered images is
pered image can be recovered with respect to different sizes             better than 99% when the rate of tampering is less than
and distributions of tampering. The tampered blocks can be               30%, is about 96% when the rate of tampering is 40%, and
in a form of either single tampered chunk or spread tam-                 is about 94% when the rate of tampering increases to 50%.
pered blocks. We altered image Lena 10–50% in total with                    (c) The recovering rate for spread-tampered images is
both types of tampering distribution, as shown in Fig. 9.                almost twice as better as that for single-tampered images
   The recovering rates of both types of tampering distribu-             when the rate of tampering is less than 30%, is 30% better
tion with respect to the rate of tampering are depicted in               when the rate of tampering is between 30% and 50%, and
Figs. 10 and 11, and can be summarized as follows.                       is 20% better when the rate of tampering increases to 50%.
2526                                                                                                 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529

                                                                                             700
                                                                                             650




                      The number of blocks without restoring
                                                                                             600
                                                                                             550
                                                                                             500
                              (total blocks=4096)                                            450
                                                                                             400
                                                                                             350
                                                                                             300
                                                                                             250
                                                                                             200
                                                                                             150
                                                                                             100
                                                                                              50
                                                                                               0
                                                                                                   16% 26% 30% 37% 39% 41% 48% 51% 54% 57% 60% 63% 70%
                                                                                                          The numberof altered blocks/ the number of total blocks

                                                                                              Fig. 10. The number of un-recovered blocks for single-tampered-chunk.
                               The number of blocks without restoring (total blocks=4096)




                                                                                            250



                                                                                            200



                                                                                            150



                                                                                            100



                                                                                             50



                                                                                              0
                                                                                                   20%   24%   28%    30%    33%    36%    39%    41%     45%      48%   50%
                                                                                                         The number of altered blocks / the number of total blocks

                                                                                              Fig. 11. The number of un-recovered blocks for spread-tampered-blocks.


5. Performance analyses                                                                                                              images.

   In this section, we analyze the performance of our method                                                                                                2552
                                                                                                                                     PSNR = 10 × log10           dB,                        (6)
from aspects of the fidelity of watermarked images, the qual-                                                                                                MSE
ity of recovered images, as well as the tamper detection rate.                                                                                                                 j <m
                                                                                                                                     where MSE = (1/m × n) i<n j =0 (cij − cij )2 , m, n
                                                                                                                                                                  i=0
                                                                                                                                     are the width and the length of the image, respectively,
5.1. Image quality analysis                                                                                                          and c, c are the pixel intensities of the two images under
                                                                                                                                     comparison.
  We use PSNR defined in Eq. (6) as the indicator of                                                                                     (a) PSNR of the watermarked image. Since only two LSBs
the quality of both watermarked images and recovered                                                                                 of each pixel are used for embedding the watermark, the
P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529                              2527

Table 3                                                                   The probability of failing both the parity check and the
The PSNRs of the watermarked images                                    intensity-relation check simultaneously is at most (1/2) ×
Image             Home        Fingerprint     Car         Beach
                                                                       (1/2) = 1/4. So the probability of false detection for all
                                                                       four sub-blocks will be at most (1/4)4 
0.39%, based on
PSNR (in dB)       44.36      44.36           44.39       44.37        the production rule of statistics. Thus, almost all erroneous
                                                                       blocks can be detected after level-2 inspection.
                                                                          (c) Level-3 detection: From (b), we know that the
PSNRs of the watermarked images are all better than 44 dB,             probability of failing to detect one tampered block af-
as listed in Table 3. As compared with the scheme in Ref.              ter level-2 detection is at most 1/256. Thus, the miss
[20] that only uses one LSB to embed the watermark, the                detection rate after level-3 detection is the probabil-
quality of the images watermarked by our scheme is de-                 ity of failing to detect more than four tampered blocks
graded about 5–6 dB.                                                   within the 3 × 3-block-neighborhood, which is less than
   (b) PSNR of the recovered image. The PSNR of a re-                  C(9,4)(1/256)4 >1/225 
0.
covered image depends how well the tampered blocks are                    From the experimental results in Table 2, we find that the
recovered. The recovery depends on how accurately those                maximum missing rate after level-1, -2, and -3 detection is
tampered blocks are detected. And, the tampering detection             12%, 0.37%, and 0%, respectively, which are quite consis-
depends on both the size and the distribution of tampering.            tent with the calculated probability derived for each level.
Table 4 lists the PSNR of five recovered images with var-               Thus, we summarize the detection capability of our method
ious sizes and distributions of tampering. From this table,            as follows:
we find that among all the single tampered images, Home
has the best PSNR of 48.48 dB, which is recovered from                  • Our method can detect any tampering of size 12 × 12
a tampered chunk of 4 × 12 pixels. Car-1 has the second                   pixels or bigger without a single miss.
best PSNR of 38.12 dB, which is recovered from a tampered               • Our method can detect any tampering of size 4 × 4 pixels
chunk of size 24 × 16. Car-2 has PSNR of 32.52 dB, which                  with a missing rate less than 0.37%.
is recovered from a tampered chunk of size 68 × 20. Beach               • Our method can detect any tampering of size 2 × 2 pixels
has the worst PSNR of 30.85 dB, which is recovered from                   with a missing rate less than 12%.
a tampered chunk of size 68 × 68. For spread tampering,
Fingerprint has PSNR of 36.46 dB, which is recovered from
a total tampered area of size 70 × 16. Comparing the re-               6. Conclusion
sults of Fingerprint and Car-2, we find that the PSNR of
Fingerprint is much better than that of Car-2, even though                We have presented a hierarchical digital watermarking
the sizes of total tampering for both images are not much              scheme for both image tamper detection and restoration in
different.                                                             this paper. Our scheme is efficient in execution time since
                                                                       it only uses simple operations such as parity check and
5.2. Tamper detection analysis                                         comparisons. It is effective in detection accuracy since it
                                                                       inspects the image hierarchically with the inspection view
   We analyze the detection algorithm from the following               grows along with the hierarchy. It is also very storage effec-
aspects:                                                               tive since it only requires a secret key and a public chaotic
   (a) Level-1 detection: If the type of error is parity error,        mixing algorithm for both tamper detection and recovery.
then we are sure that the sub-block is indeed erroneous.               The experimental results demonstrate that the precision of
   (b) Level-2 detection: If the type of error is intensity-           tamper detection and localization is close to 100% after
relationship error, we cannot be sure whether the sub-block            level-2 inspection and the tamper recovery rate is better than
under inspection is erroneous or other sub-blocks within the           93% for a less than half tampered image. As compared with
same block are erroneous. However, some pixels within the              the method in Ref. [20], our method is not only as simple
block must be wrong. Thus, in case the tampered sub-block              and as effective in tamper detection and localization, it also
is not detected in level-1 inspection, the whole block will            provides with the capability of tamper recovery by trading
be marked erroneous after level-2 inspection.                          off the quality of the watermarked images about 5 dB. Our


Table 4
The PSNRs of the recovered images relative to the watermarked images

Image                        Home                     Fingerprint               Car-1                 Car-2                  Beach

Size of tamper                4 × 12                  70 × 16                   24 × 16               68 × 20                68 × 68
PSNR (in dB)                  48.48                   36.46                     38.12                 32.52                  30.85
2528                                      P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529

future research includes improvements on both security and                [13] M.M. Yeung, F. Mintizer, An invisible watermarking
watermark-payload reduction while maintaining the capa-                        technique for image verification, in: Proceedings of the IEEE
bility of both tamper detection and recovery.                                  International Conference on Image Processing, vol. I, Santa
                                                                               Barbara, CA, October 1997, pp. 680–683.
                                                                          [14] R.L. Lagendijk, G.C. Langelaar, I. Setyawan, Watermarking
                                                                               digital images and video data, IEEE Signal Process. Mag. 17
                                                                               (2000) 20–46.
References                                                                [15] F. Hartung, M. Kutter, Multimedia watermarking techniques,
                                                                               Proc. IEEE 87 (1999) 1079–1107.
 [1] G.I. Friedman, The trustworthy digital camera: restoring             [16] M.D. Swanson, M. Kobayashi, A.H. Tewfik, Multimedia data
     credibility to the photographic image, in: Proceedings of the             embedding and watermarking technologies, Proc. IEEE 86
     IEEE International Conference on Image Processing, vol. II,               (1988) 1064–1087.
     Chicago, IL, USA, October 1998, pp. 409–413.
                                                                          [17] I.J. Cox, M.I. Miller, A.L. Mckellips, Watermarking as
 [2] J. Dittmann, A. Steinmetz, R. Steinmetz, Content-based
                                                                               communications with side information, Proc. IEEE 87 (1999)
     digital signature for motion pictures authentication and
                                                                               1127–1147.
     content-fragile watermarking, in: Proceedings of the IEEE
     International Conference on Multimedia Computing Systems,            [18] C.De. Vleeschouwer, J.F. Delaigle, B. Macq, Invisibility and
     1999, pp. 209–213.                                                        application functionalities in perceptual watermarking—an
 [3] C.Y. Lin, S.F. Chang, A robust image authentication method                overview, Proc. IEEE 90 (1) (2002) 64–77.
     surviving JPEG lossy compression, Proc. SPIE 3312 (1998)             [19] C.W. Wu, D. Coppersmith, F.C. Mintizer, C.P. Tresser, M.M.
     296–307.                                                                  Mueng, Fragile imperceptible digital watermark and privacy
 [4] C.S. Lu, H.Y.M. Liao, C.J. Sze, Structural digital signature for          control, Proceedings of the SPIE, Security and Watermarking
     image authentication: an incidental distortion resistant scheme,          of Multimedia Contents, vol. 3657, January 1999, pp.79–84.
     in: Proceedings of the Multimedia Security Workshop 8th              [20] M.U. Celik, G. Sharma, E. Saber, A.M. Tekalp,
     ACM International Conference on Multimedia, Los Angeles,                  Hierarchical watermarking for secure image authentication
     CA, 2000, pp. 115–118.                                                    with localization, IEEE Trans. Image Process. 11 (6) (2002)
 [5] W. Stallings, Network Security Essentials: Application and                585–594.
     Standards, Prentice-Hall, Upper Saddle River, NJ, 2000.              [21] D. Kundur, D. Hatzinakos, Digital watermarking for telltale
 [6] J. Fridrich, Image watermarking for tamper detection, in:                 tamper proofing and authentication, Proc. IEEE 87 (1999)
     Proceedings of the IEEE International Conference on Image                 1167–1180.
     Processing, vol. II, Chicago, IL, USA, October 1998, pp.
                                                                          [22] J. Eggers, B. Girod, Blind watermarking applied to image
     404–408.
                                                                               authentication, in: Proceedings of the IEEE ICASSP, Salt Lake
 [7] J. Fridrich, M. Goljan, A.C. Baldoza, New fragile
                                                                               City, UT, May 2001, pp. 1977–1980.
     authentication watermark for images, in: Proceedings of
     the IEEE International Conference on Image Processing,               [23] S. Bhattacharjee, M. Kutter, Compression tolerant image
     Vancouver, BC, Canada, September 2000, pp. 10–13.                         authentication, in: Proceedings of the IEEE International
 [8] D. Kundur, D. Hatzinakos, Toward a telltale watermarking                  Conference on Image Processing, Chicago, IL, October 1998,
     technique for tamper-proofing, in: Proceedings of the IEEE                 pp. 435–439.
     International Conference on Image Processing, vol. 2, 1998,          [24] C.S. Lu, H.Y. Liao, Multipurpose watermarking for image
     pp. 409–413.                                                              authentication and protection, IEEE Trans. Image Process. 10
 [9] E. Lin, E.J. Delp, A review of fragile image watermarks, in:              (2001) 1579–1592.
     Proceedings of the ACM Multimedia and Security Workshop,             [25] M. Holliman, N. Memon, Counterfeiting attacks on oblivious
     Orlando, FL, November 1999, pp. 35–40.                                    block-wise independent invisible watermarking schemes,
[10] M.P. Queluz, Content-based integrity protection of digital                IEEE Trans. Image Process. 9 (2000) 432–441.
     image, Proceedings of the SPIE, Security and Watermarking            [26] G. Voyatzis, l. Pitas, Chaotic mixing of digital images
     of Multimedia Contents II, vol. 3971, Bellingham, WA, 2000,               and applications to watermarking, in: Proceedings of the
     pp. 85–93.                                                                European Conference on Multimedia Applications Services
[11] M. Schneider, S.F. Chang, A robust content based digital                  and Techniques (ECMAST’96), 1996, pp. 687–689.
     signature for image authentication, in: Proceedings of the
                                                                          [27] P.W. Wong, N. Memon, Secret and public key authentication
     IEEE International Conference on Image Processing, vol. III,
                                                                               schemes that resist vector quantization attack, Proc. SPIE 3971
     Lausanne, Switzerland, September 1996, pp. 227–230.
                                                                               (75) (2002) 417–427.
[12] P.W. Wong, A public key watermark for image verification
     and authentication, in: Proceedings of the IEEE International        [28] G. Voyatzis, I. Pitas, Applications of toral automorphisms
     Conference on Image Processing, Chicago, IL, October 1998,                in image watermarking, in: Proceedings of the International
     pp. 455–459.                                                              Conference on Image Processing, vol. II, 1996, pp. 237–240.




About the Author—PHEN LAN LIN received the B.S. degree in Engineering Science from National Cheng-Kung University, Taiwan in
1973, the M.S. degree in Mathematics from Texas Tech University, Texas in 1978, and both the M.S. and Ph.D. degrees in Electrical
Engineering from Southern Methodist University, Dallas, Texas in 1992 and 1994, respectively.
P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529                                     2529

Dr. Lin was with Texas Instruments (TI) in Dallas, Texas as a member of technical staff, lead engineer, and project manager from 1978 to
1992. Her working experiences include control and computer vision software development, mobile robot navigation, as well as automatic
IC inspection project management.
She has been a professor in the Department of Computer Science and Information Management, Providence University, Taiwan since 2001
and is a professor in the Department of Computer Science and Information Engineering. She has also been serving as the Director of
Computer and Communication Center in the university since 2001.
Her current research interests are in the fields of multimedia security, network security, medical imaging, and visual inspection.

About the Author—CHUNG-KAI HSIEH received the B.S. degree in Computer Science and Information Management from Providence
University, Taiwan in 2002 and the M.S. degree in Computer Science from Chung Hsing University, Taiwan in 2004.
His research interests are in the fields of multimedia and network security.

About the Author—PO-WHEI HUANG received the B.S. degree in Applied Mathematics from National Chung-Hsing University in 1973,
the MS degree in mathematics from Texas Tech University in 1978, and the Ph.D. degree in Computer Science and Engineering from
Southern Methodist University in 1989.
He was with Texas Instruments in Dallas as a member of technical staff, supervisor, lead engineer, section manager, and software development
manager from 1978 to 1991. His working experiences include bubble memory testing and application, IC design automation, Lisp machine
on a chip design, automatic program generation, production planning and scheduling, and wafer factory automation.
He was the department head and has been a professor in the Computer Science Department at National Chung-Hsing University. Since
September 2002, he has also been serving as the vice president of National Huwei University of Science and Technology located in Yunlin
County of Taiwan.
His current research interests are in the fields of multimedia database, medical imaging, visual inspection, pattern recognition, and artificial
intelligence.

Contenu connexe

Tendances

A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...ijcsit
 
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionReview of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionIRJET Journal
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYijmpict
 
Vision and Multimedia Reading Group: DeCAF: a Deep Convolutional Activation F...
Vision and Multimedia Reading Group: DeCAF: a Deep Convolutional Activation F...Vision and Multimedia Reading Group: DeCAF: a Deep Convolutional Activation F...
Vision and Multimedia Reading Group: DeCAF: a Deep Convolutional Activation F...Simone Ercoli
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESIJERD Editor
 
06 9237 it texture classification based edit putri
06 9237 it   texture classification based edit putri06 9237 it   texture classification based edit putri
06 9237 it texture classification based edit putriIAESIJEECS
 
Codetecon #KRK 3 - Object detection with Deep Learning
Codetecon #KRK 3 - Object detection with Deep LearningCodetecon #KRK 3 - Object detection with Deep Learning
Codetecon #KRK 3 - Object detection with Deep LearningMatthew Opala
 
Semantic Video Segmentation with Using Ensemble of Particular Classifiers and...
Semantic Video Segmentation with Using Ensemble of Particular Classifiers and...Semantic Video Segmentation with Using Ensemble of Particular Classifiers and...
Semantic Video Segmentation with Using Ensemble of Particular Classifiers and...ITIIIndustries
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
SVD and Lifting Wavelet Based Fragile Image Watermarking
SVD and Lifting Wavelet Based Fragile Image WatermarkingSVD and Lifting Wavelet Based Fragile Image Watermarking
SVD and Lifting Wavelet Based Fragile Image WatermarkingIDES Editor
 
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...sipij
 
IWLCS'2007: Substructural Surrogates for Learning Decomposable Classification...
IWLCS'2007: Substructural Surrogates for Learning Decomposable Classification...IWLCS'2007: Substructural Surrogates for Learning Decomposable Classification...
IWLCS'2007: Substructural Surrogates for Learning Decomposable Classification...Albert Orriols-Puig
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption cscpconf
 
Recent Progress on Object Detection_20170331
Recent Progress on Object Detection_20170331Recent Progress on Object Detection_20170331
Recent Progress on Object Detection_20170331Jihong Kang
 
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018Universitat Politècnica de Catalunya
 
CS 354 Interaction
CS 354 InteractionCS 354 Interaction
CS 354 InteractionMark Kilgard
 
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018Universitat Politècnica de Catalunya
 

Tendances (20)

A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...A robust blind and secure watermarking scheme using positive semi definite ma...
A robust blind and secure watermarking scheme using positive semi definite ma...
 
Review of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image CompressionReview of Diverse Techniques Used for Effective Fractal Image Compression
Review of Diverse Techniques Used for Effective Fractal Image Compression
 
Image Retrieval (D4L5 2017 UPC Deep Learning for Computer Vision)
Image Retrieval (D4L5 2017 UPC Deep Learning for Computer Vision)Image Retrieval (D4L5 2017 UPC Deep Learning for Computer Vision)
Image Retrieval (D4L5 2017 UPC Deep Learning for Computer Vision)
 
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACYA DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY
 
Semantic Segmentation - Míriam Bellver - UPC Barcelona 2018
Semantic Segmentation - Míriam Bellver - UPC Barcelona 2018Semantic Segmentation - Míriam Bellver - UPC Barcelona 2018
Semantic Segmentation - Míriam Bellver - UPC Barcelona 2018
 
Vision and Multimedia Reading Group: DeCAF: a Deep Convolutional Activation F...
Vision and Multimedia Reading Group: DeCAF: a Deep Convolutional Activation F...Vision and Multimedia Reading Group: DeCAF: a Deep Convolutional Activation F...
Vision and Multimedia Reading Group: DeCAF: a Deep Convolutional Activation F...
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 
06 9237 it texture classification based edit putri
06 9237 it   texture classification based edit putri06 9237 it   texture classification based edit putri
06 9237 it texture classification based edit putri
 
Codetecon #KRK 3 - Object detection with Deep Learning
Codetecon #KRK 3 - Object detection with Deep LearningCodetecon #KRK 3 - Object detection with Deep Learning
Codetecon #KRK 3 - Object detection with Deep Learning
 
CSMR10a.ppt
CSMR10a.pptCSMR10a.ppt
CSMR10a.ppt
 
Semantic Video Segmentation with Using Ensemble of Particular Classifiers and...
Semantic Video Segmentation with Using Ensemble of Particular Classifiers and...Semantic Video Segmentation with Using Ensemble of Particular Classifiers and...
Semantic Video Segmentation with Using Ensemble of Particular Classifiers and...
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
SVD and Lifting Wavelet Based Fragile Image Watermarking
SVD and Lifting Wavelet Based Fragile Image WatermarkingSVD and Lifting Wavelet Based Fragile Image Watermarking
SVD and Lifting Wavelet Based Fragile Image Watermarking
 
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...WAVELET BASED AUTHENTICATION/SECRET  TRANSMISSION THROUGH IMAGE RESIZING  (WA...
WAVELET BASED AUTHENTICATION/SECRET TRANSMISSION THROUGH IMAGE RESIZING (WA...
 
IWLCS'2007: Substructural Surrogates for Learning Decomposable Classification...
IWLCS'2007: Substructural Surrogates for Learning Decomposable Classification...IWLCS'2007: Substructural Surrogates for Learning Decomposable Classification...
IWLCS'2007: Substructural Surrogates for Learning Decomposable Classification...
 
A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption A Novel Algorithm for Watermarking and Image Encryption
A Novel Algorithm for Watermarking and Image Encryption
 
Recent Progress on Object Detection_20170331
Recent Progress on Object Detection_20170331Recent Progress on Object Detection_20170331
Recent Progress on Object Detection_20170331
 
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018
Lifelong / Incremental Deep Learning - Ramon Morros - UPC Barcelona 2018
 
CS 354 Interaction
CS 354 InteractionCS 354 Interaction
CS 354 Interaction
 
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018
Transfer Learning and Domain Adaptation - Ramon Morros - UPC Barcelona 2018
 

En vedette

P 9 Killer Halftone Effect
P 9  Killer Halftone EffectP 9  Killer Halftone Effect
P 9 Killer Halftone Effectsumidahilo
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarkingJasni Zain
 
Graphic design presentation 3
Graphic design presentation 3Graphic design presentation 3
Graphic design presentation 3sumidahilo
 

En vedette (6)

P 9 Killer Halftone Effect
P 9  Killer Halftone EffectP 9  Killer Halftone Effect
P 9 Killer Halftone Effect
 
Digital image watermarking
Digital image watermarkingDigital image watermarking
Digital image watermarking
 
Graphic design presentation 3
Graphic design presentation 3Graphic design presentation 3
Graphic design presentation 3
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
Noise Models
Noise ModelsNoise Models
Noise Models
 
Halftoning in Computer Graphics
Halftoning  in Computer GraphicsHalftoning  in Computer Graphics
Halftoning in Computer Graphics
 

Similaire à Watermarking

E0333021025
E0333021025E0333021025
E0333021025theijes
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingcsandit
 
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGPSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGcscpconf
 
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...IRJET Journal
 
A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption IJECEIAES
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSdebasis sahoo
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyIOSR Journals
 
Conference_paper.pdf
Conference_paper.pdfConference_paper.pdf
Conference_paper.pdfNarenRajVivek
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODeditorijcres
 
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...sipij
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
developments and applications of the self-organizing map and related algorithms
developments and applications of the self-organizing map and related algorithmsdevelopments and applications of the self-organizing map and related algorithms
developments and applications of the self-organizing map and related algorithmsAmir Shokri
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using WaveletIRJET Journal
 
Direct Perception for Congestion Scene Detection Using TensorFlow
Direct Perception for Congestion Scene Detection Using TensorFlowDirect Perception for Congestion Scene Detection Using TensorFlow
Direct Perception for Congestion Scene Detection Using TensorFlowArtur Filipowicz
 
Extracting ocean
Extracting oceanExtracting ocean
Extracting oceanes712
 
real-time-object
real-time-objectreal-time-object
real-time-objectArjan Gupta
 
IRJET- Object Detection in Underwater Images using Faster Region based Convol...
IRJET- Object Detection in Underwater Images using Faster Region based Convol...IRJET- Object Detection in Underwater Images using Faster Region based Convol...
IRJET- Object Detection in Underwater Images using Faster Region based Convol...IRJET Journal
 

Similaire à Watermarking (20)

Journal_IJABME
Journal_IJABMEJournal_IJABME
Journal_IJABME
 
E0333021025
E0333021025E0333021025
E0333021025
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofing
 
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFINGPSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
PSO BASED OPTIMIZED SECURITY SCHEME FOR IMAGE AUTHENTICATION AND TAMPER PROOFING
 
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
Enhanced Watemarked Images by Various Attacks Based on DWT with Differential ...
 
A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption A new four-dimensional hyper-chaotic system for image encryption
A new four-dimensional hyper-chaotic system for image encryption
 
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONSDIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
DIGITAL WATERMARKING USING DIFFERENT CHAOTIC EQUATIONS
 
A Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder PiracyA Video Watermarking Scheme to Hinder Camcorder Piracy
A Video Watermarking Scheme to Hinder Camcorder Piracy
 
Conference_paper.pdf
Conference_paper.pdfConference_paper.pdf
Conference_paper.pdf
 
I0343065072
I0343065072I0343065072
I0343065072
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
Paper_KST
Paper_KSTPaper_KST
Paper_KST
 
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
A Secure and Robust CDMA Digital Image Watermarking Algorithm Based on DWT2, ...
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
developments and applications of the self-organizing map and related algorithms
developments and applications of the self-organizing map and related algorithmsdevelopments and applications of the self-organizing map and related algorithms
developments and applications of the self-organizing map and related algorithms
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using Wavelet
 
Direct Perception for Congestion Scene Detection Using TensorFlow
Direct Perception for Congestion Scene Detection Using TensorFlowDirect Perception for Congestion Scene Detection Using TensorFlow
Direct Perception for Congestion Scene Detection Using TensorFlow
 
Extracting ocean
Extracting oceanExtracting ocean
Extracting ocean
 
real-time-object
real-time-objectreal-time-object
real-time-object
 
IRJET- Object Detection in Underwater Images using Faster Region based Convol...
IRJET- Object Detection in Underwater Images using Faster Region based Convol...IRJET- Object Detection in Underwater Images using Faster Region based Convol...
IRJET- Object Detection in Underwater Images using Faster Region based Convol...
 

Dernier

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Dernier (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Watermarking

  • 1. Pattern Recognition 38 (2005) 2519 – 2529 www.elsevier.com/locate/patcog A hierarchical digital watermarking method for image tamper detection and recoveryଁ Phen Lan Lina,∗ , Chung-Kai Hsiehb , Po-Whei Huangb a Department of Computer Science and Information Engineering, Providence University, Shalu, Taichung 433, Taiwan b Department of Computer Science, National Chung Hsing University, Taichung, Taiwan Received 2 December 2003; received in revised form 21 February 2005; accepted 21 February 2005 Abstract In this paper, we present an efficient and effective digital watermarking method for image tamper detection and recovery. Our method is efficient as it only uses simple operations such as parity check and comparison between average intensities. It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be ensured. That is, if a tampered block is not detected in level-1 inspection, it will be detected in level-2 or level-3 inspection with a probability of nearly 1. Our method is also very storage effective, as it only requires a secret key and a public chaotic mixing algorithm to recover a tampered image. The experimental results demonstrate that the precision of tamper detection and localization is 99.6% and 100% after level-2 and level-3 inspection, respectively. The tamper recovery rate is better than 93% for a less than half tampered image. As compared with the method in Celik et al. [IEEE Trans. Image Process. 11(6) (2002) 585], our method is not only as simple and as effective in tamper detection and localization, it also provides with the capability of tamper recovery by trading off the quality of the watermarked images about 5 dB. ᭧ 2005 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved. Keywords: Image authentication; Tamper detection; Tamper localization; Digital watermarking 1. Introduction to the image and verify the received image by comparing its signature to the signature attached to it. The signature Since the past decade, there has been a rapid growth in can be either an encrypted or a signed hash value of image using digital multimedia data. The flourish of PC with the contents or image characteristics (e.g., edges, histograms, wideband Internet connections has made the distribution of moments, etc.) [5]. These mechanisms can detect if an image multimedia data much easier and faster. On the other hand, has been changed; however, they cannot locate where the the wide availability of powerful image processing tools has image was changed. Besides, the attached signature requires also made imperceptible image modifications possible. As additional bandwidth or storage that may not always be a result, image authenticity becomes greatly threatened. available. To solve these problems, many researchers have Classical image authentication mechanisms [1–4], some- proposed watermarking for image authentication [6–17]. times called tamper-proofing mechanisms, attach a signature Based on the functionality, Vleeschouwer et al. [18] clas- sified the image authentication watermarking techniques ଁ This research is supported by National Science Council of into three categories: (1) fragile watermarking, which detects ROC under Grant NSC-92-2213-E-126-009. any modification to the image [7,11–13,19]; (2) semi-fragile ∗ Corresponding author. Tel.: +886-4-632-8001x3409; watermarking, which detects and localizes the modifications fax: +886-4-632-4045. to the contents [6–8]; (3) content-based fragile watermark- E-mail address: lan@pu.edu.tw (P.L. Lin). ing, which detects only the significant changes in the image 0031-3203/$30.00 ᭧ 2005 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved. doi:10.1016/j.patcog.2005.02.007
  • 2. 2520 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529 while permitting content-preserving processing such as cod- 2.1. VQ counterfeiting attacks ing and scanning [2,10]. In Ref. [20], the above categories (1) and (2) are combined as fragile watermarking, whereas Holliman and Memon [25] presented a counterfeiting at- category (3) is named as semi-fragile watermarking. Some tack on block-wise independent watermarking schemes. In examples of these schemes are presented in Refs. [21–24]. such an attack, the attacker is able to create a counterfeit im- In this paper, we adopt the definitions of fragile and semi- age by using a collage of watermarked blocks selected from fragile watermarking presented in Ref. [20]. a large database. Because block-wise independent schemes Wong [12] proposed a public-key fragile watermark- validate the watermark of each individual block and the wa- ing scheme that embeds a digital signature of each block termark of each block comprises only the information of the within the image into the least significant bits of the same block itself, the counterfeit image generated from the VQ block. However, Holliman and Memon [25] soon presented codebook can easily pass the authentication test of block- a vector quantization (VQ) counterfeiting attack that can wise independent schemes. construct a counterfeit image from a VQ codebook gen- erated from a set of watermarked images. To solve the 2.2. Torus automorphism problem of VQ counterfeiting attack, several enhanced algorithms were proposed [7,25,27]. Nonetheless, they Torus automorphism is a kind of dynamic system. Briefly either fail to effectively address the problem or sacrifice speaking, a dynamic system is a system whose states change tamper localization accuracy of the original methods [20]. with time t. When t is discrete, a dynamic system can be Celik et al. then presented an algorithm based on Wong’s presented as an iteration of a function f, i.e., St+1 = f (St ), scheme and demonstrated that their algorithm can thwart t ∈ Z = {0, 1, 2, . . .}, St , St+1 are the states at time t and the VQ codebook attack while sustaining the localization t + 1, respectively. A two-dimensional Torus automorphism property [20]. can be considered as a permutation function or a spatial In this paper, we present an efficient and effective dig- transformation of a plane region. This transformation can be ital watermarking method for image tamper detection and performed using a 2 × 2 matrix A with constant elements. recovery. Our method is efficient as it only uses simple op- More specifically, a state St+1 or a point (xi+1 , yi+1 ) can be erations such as parity check and comparison between av- transformed from another state St or another point (xi , yi ) erage intensities. It is effective because the scheme inspects by the image hierarchically with the inspection view increases a1 a2 xi+1 xi along with the hierarchy so that the accuracy of tamper lo- A= , =A× mod N, (1) a3 a4 yi+1 yi calization can be ensured. That is, if a tampered block is not detected in level-1 inspection, it will be detected in level- where ai ∈ Z, |A| (the determinant of A) =1, and A has 2 or level-3 inspection with a probability of nearly 1. Our eigenvalues 1,2 ∈ R − {−1, 0, 1}, R is the set of rational method is also very storage effective, as it only requires a se- numbers. The detailed characteristics of A are described in cret key and a public chaotic mixing algorithm to recover the Refs. [26,28]. A set of successive points {S0 , S1 , S2 , . . .}, tampered areas. The experimental results demonstrate that generated by Eq. (1), composes an orbit ϑ of the system and the precision of tamper detection and localization is close to the initial point S0 =(x0 , y0 ) classifies ϑ into two categories. 100% after level-2 inspection and the tamper recovery rate When x0 and/or y0 are irrational, ϑ is infinite. When both is better than 93% for a less than half tampered image. As x0 and y0 are rational, ϑ is chaotic and periodic at every R compared with the method in Ref. [20], our method is not times, i.e., SR = S0 . R is called the “recurrence time”. only as simple and as effective in tamper detection and lo- Voyatzis and Pitas [26] presented a one-parameter, two- calization, it also provides with the capability of tamper re- dimensional, discrete Torus automorphism, shown in Eq. covery by trading off the quality of the watermarked images (2), for creating a unique and random mapping of the pixels about 5 dB. within an image: The remainder of this paper is organized as follows. In 1 1 xi+1 xi Section 2, we briefly describe VQ counterfeiting attacks and A= , =A× mod N, (2) Torus automorphism. Our proposed watermarking scheme is k k+1 yi+1 yi presented in Section 3. In Sections 4 and 5, we demonstrate where (xi , yi ) ∈ [0, N − 1] × [0, N − 1] and k ∈ [0, N − 1]. the experimental results and analyze the performance of The recurrence time R depends upon the parameters k, N, our scheme. Finally, the concluding remarks are given in and the initial point (x0 , y0 ). In most cases, R is equal to Section 6. N − 1 or N + 1, when N is prime [26,28]. 2. Backgrounds 3. The proposed scheme In this section, we briefly describe both vector quantiza- Our proposed scheme can perform both tamper detec- tion (VQ) counterfeiting attacks and Torus automorphism. tion and recovery for tampered images. While tamper detec-
  • 3. P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529 2521 Table 1 The mapping of blocks using Eq. (3) with k = 37, 6, and N = 64 k X 1 2 3 4 5 6 7 8 33 34 35 36 (x, y) (0,0) (0,1) (0,2) (0,3) (0,4) (0,5) (0,6) (0,7) (4,0) (4,1) (4,2) (4,3) 37 X 38 11 48 21 58 31 4 41 6 43 16 53 (x , y ) (4,5) (1,2), (5,7) (2,4) (7,1) (3,6) (0,3) (5,0) (0,5) (5,2) (1,7) (6,4) 6 X 7 13 19 25 31 37 43 49 7 13 19 25 (x , y ) (0,6) (1,4) (2,2) (3,0) (3,6) (4,4) (5,2) (6,0) (0,6) (1,4) (2,2) (3,0) tion is achieved through a simple, block-based, three-level 2. Assign a unique and consecutive integer X ∈ {0, 1, 2, inspection of in-block information only, the recovery of a . . . , N − 1} to each block from left to right and top to tampered block relies on its feature information hidden in bottom, where N = (M/4) × (M/4). another block that can be determined by a one-dimensional 3. Randomly pick a prime number k ∈ [1, N − 1]. transformation similar to Torus automorphism, as described 4. For each block number X, apply Eq. (3) to obtain X , the in Section 2. Our scheme can be best described through the number of its mapping block. following three stages: watermark embedding, tamper de- 5. Record all pairs of X and X to form the block mapping tection, and tampered image recovery. sequence. Note that the secret key k must be a prime in order to 3.1. Block-based watermark embedding obtain a one-to-one mapping; otherwise, the period is less than N and a many-to-one mapping may occur. Table 1 We describe the watermark-embedding procedure in this lists some portions of the mapping sequence generated with section. Each image is of size M × M pixels, where M is N = 64, k = 37 and 6, respectively. In this table, X starts assumed to be a multiple of four and the number of gray- to repeat at X = 33 when k = 6, which is not a prime. levels is 256. 3.1.3. Block watermark embedding 3.1.1. Preparation For each block B of 4 × 4 pixels, we further divide it into We need to prepare a block-mapping sequence A → B → four sub-blocks of 2 × 2 pixels, as shown in Fig. 1. The wa- C → D → · · · → A for watermark embedding, where each termark in each sub-block is a 3-tuple (v, p, r), where both symbol denotes an individual block. The intensity feature v and p are 1-bit authentication watermark, and r is a 6-bit of block A will be embedded in block B, and the intensity recovery watermark for the corresponding sub-block within feature of block B will be embedded in block C, etc. block A mapped to B. The following algorithm describes Since the number of blocks in each dimension of most how the 3-tuple watermark of each sub-block is generated images can hardly be a prime number, we cannot obtain a and embedded. one-to-one mapping among the blocks by applying Eq. (2), based on the analysis in Ref. [26]. Instead, we use a 1-D 3.1.4. Sub-block watermark generation and embedding transformation as shown in Eq. (3) to obtain a one-to-one algorithm mapping sequence. 1. Set the two LSBs of each pixel within the block to zero and compute the average intensity of the block and each X = [f (X) = (k × X) mod N] + 1, (3) of its four sub-blocks, denoted by avg_B and avg_Bs , respectively. where X , X (∈ [0, N − 1]) are the block number, k (a prime 2. Generate the authentication watermark v of each sub- and ∈ [0, N − 1]) is a secret key, and N (∈ Z − {0}) is the block as in Eq. (4) below: total number of blocks in the image. The generation algorithm of the block-mapping sequence 1 if avg_Bs avg_B, is as follows. v= (4) 0 otherwise. 3. Generate the parity-check bit p of each sub-block as in 3.1.2. Block mapping sequence generation algorithm Eq. (5) below: 1. Divide the image into non-overlapping blocks of 4 × 4 1 if num is odd, p= (5) pixels. 0 otherwise,
  • 4. 2522 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529 1 3 9 11 avg_As 2 4 10 12 = (I1+I2+I3+I4)/4 5 7 13 15 6 8 14 16 (a) Block A and one of its sub-block a1 a2 a3 a4 a5 a6 a7 a8 r (c) The six MSBs of avg_As 1 3 9 11 v ` p of B 2 4 10 12 5 7 13 15 6 8 14 16 (b) Block B and one of its sub-block Fig. 1. Watermark generation procedure for the sub-block comprising pixels 1,2,3,4: (a) Block A and one of its sub-block; (b) block B and one of its sub-block; (c) the six MSBs of avg_A. bit 1 2 3 4 5 6 7 8 For each block, denoted as B , we first set the two LSBs of pixel 1 each pixel in B to zero and compute its average intensity, v r denoted as avg_B . We then perform 3-level hierarchical pixel 2 p r detection. In level-1 detection, we check each 2 × 2 sub- pixel 3 r r block within one block. In level-2 detection, we treat a 4 × 4 pixel 4 r r block as one unit. Finally, we check the block by extending the inspection view to its 3×3 block-neighborhood in level-3 Original image data Embedding data detection. Level-4 detection is for VQ-attack resiliency only. The procedure of our hierarchical tamper detection scheme Fig. 2. The 8-bit Watermark (v, p, r) embedded in pixels 1,2,3,4. is described in the following. where num is the total number of 1s in the six MSBs of avg_Bs . 3.2.1. Hierarchical tamper detection algorithm 4. From the mapping sequence generated in the preparation Level-1 detection. For each sub-block Bs of 2 × 2 pixels step, obtain block A whose recovery information will be within block B , perform the following steps: stored in block B. 5. Compute the average intensity of each corresponding 1. Extract v and p from Bs . sub-block As within A, as shown in Fig. 1(a), and denote 2. Set the two LSBs of each pixel within each Bs to zero it avg_As . and compute the average intensity for each sub-block Bs , 6. Obtain the recovery intensity r of As by truncating the denoted as avg_Bs . two LSBs in avg_As , as shown in Fig. 1(c). 3. Count the total number of 1s in avg_Bs and denote it Ns . 7. Embed the 3-tuple-watermark (v, p, r), eight bits in all, 4. Set the parity-check bit p of Bs to 1 if Ns is odd; onto the two LSBs of each pixel within Bs , as shown in otherwise, set it to 0. Fig. 2. 5. Compare p with p. If they are not equal, mark Bs erro- neous and complete the detection for Bs . The watermark generation procedure for the sub-block 6. Set the algebraic relation v = 1 if avg_Bs > = avg_B ; comprising pixels 1, 2, 3, and 4 is illustrated in Fig. 1. How otherwise, set v = 0. the 8-bit (v, p, r) are embedded in these four pixels is shown 7. Compare v with v. If they are not equal, mark Bs er- in Fig. 2. roneous and complete the detection for Bs ; otherwise, mark it valid. 3.2. Block-based hierarchical tamper detection Level-2 detection. For each block of size 4 × 4 pixels, The test image is first divided into non-overlapping blocks mark this block erroneous if any of its sub-block is marked of 4 × 4 pixels, as in the watermark embedding process. erroneous; otherwise, mark it valid.
  • 5. P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529 2523 5. Pad the 6-bit-intensity with two 0s to the end and replace the intensity of each pixel within the sub-block with this Error B Error new 8-bit intensity. Error Error Error 6. Repeat step 5 for all four sub-blocks within block B and mark block B valid. Fig. 3. The 3 × 3 block-neighborhood of block B. 4. Experimental results Level-3 detection. For each valid block of size 4×4 pixels, mark the block erroneous if there are five or more erroneous We conduct three experiments to test the performance of blocks in its 3 × 3 block-neighborhood, as shown in Fig. 3. our proposed scheme on both tamper detection and tampered Level-4 detection (only required for resisting against VQ image restoration. attack). For each valid block B of size 4×4 pixels, perform the following steps: 4.1. Performance on images with slight to median degree 1. Find the block number of block C using secret key k of tampering and Eq. (3). Note that block C is the one in which the intensity feature of block B is embedded. We use four images: Home, Car, Fingerprint, and Beach, 2. Locate block C. as shown in Figs. 4(a)–7(a), for this experiment. All are of 3. If block C is marked erroneous, assume block B is cor- size 256 × 256 pixels. The experiments and their respective rect and complete the test for block B . results are described in the following. 4. If block C is valid, perform the following steps: (a) The number on the doorplate in the watermarked Home has been modified, as shown in Fig. 4(b). The size (a) Obtain the 6-bit should-be intensity of each Bs by of the modification is about 4 × 12. Fig. 4(c) shows the firstly extracting the two LSBs from each pixel in detected tamper area using level-1 detection, and Fig. 4(d) the corresponding sub-block within block C then dis- shows the recovered Home. carding the bits for v, p and padding two 0s to the (b) The number on the license plate in the watermarked end to make an 8-bit value, denoted as avg_B1s . Car has been wiped out, as shown in Fig. 5(b). The size of (b) Compute the average intensity of each Bs with the the modification is about 68 × 20. Figs. 5(c) and (e) show two LSBs of each pixel set to zero beforehand and the detected tamper area using hierarchical level-1 and -2 denote it avg_Bs . inspections, and Figs. 5(d) and (f) show the recovered Car, (c) Compare avg_Bs with avg_B1s and mark B erro- respectively. neous if they are different. (c) The watermarked Fingerprint, as shown in Fig. 6(a), has been slightly and randomly modified, as shown in 3.3. Block-based tampered image recovery After the detection stage, all the blocks are marked ei- ther valid or erroneous. We only need to recover the erro- neous blocks and leave those valid blocks as they are. The restoration procedure for each erroneous block is described as follows. For convenience of description, we call the erroneous block under recovery block B and the block embedded with its intensity block C. 3.3.1. Block recovery algorithm 1. Calculate the block number for block C using secret key k and Eq. (3). 2. Locate block C. 3. If block C is marked erroneous, skip the recovery for this block. 4. If block C is valid, obtain the 6-bit-intensity of each sub- block within block B by firstly extracting the two LSBs from each pixel in the corresponding sub-block within Fig. 4. (a) The watermarked Home; (b) tampered Home; (c) de- block C then discarding the bits v and p. tected erroneous region; (d) recovered Home.
  • 6. 2524 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529 Fig. 5. (a) The watermarked Car; (b) tampered Car; (c,e) detected erroneous region; (d,f) recovered Car. Fig. 7. The watermarked Beach; (b) tampered Beach; (c,e,g) de- tected erroneous regions; (d,f,h) recovered Beaches. 8 × 8 pixels. Figs. 6(d) and (f) show the recovered Finger- prints, respectively. (d) The watermarked Beach, as shown in Fig. 7(a), has been inserted with a deer, as shown in Fig. 7(b). The modifi- cation is so natural that one can hardly suspect any changes that had been made to this picture. Using our method, we can detect the modification, as shown in Figs. 7(c), (e), and (g) with only level-1, both level-1 and -2, or all three lev- els of detection, respectively. The size of the modification is about 68 × 68 pixels. Figs. 7(d), (f), and (h) show the recovered Beaches, respectively. 4.2. Performance of tamper detection on 100% tampered images Fig. 6. (a) The watermarked Fingerprint; (b) tampered Fingerprint; (c,e) detected erroneous regions; (d,f) recovered Fingerprints. We test the tamper detection capability for large tam- pered area with image Lena, as shown in Fig. 8(a). All Fig. 6(b). Comparing Figs. 6(a) with (b), we can hardly dif- blocks in image Lena are 100% altered by the four following ferentiate one from the other. Using our method, we can methods. detect the modifications, as shown in Figs. 6(c) and (e) with only level-1 detection, or both level-1 and -2 detections, re- M1: Covering the whole image with leaf patterns, as de- spectively. The size of the smallest modification is about picted in Fig. 8(b).
  • 7. P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529 2525 Fig. 8. (a) Unaltered image; (b–e) All blocks in (a) are 100% altered by method M1–M4, respectively. Table 2 The miss detection rates after each level of inspection Image Home Car Fingerprint Beach Level-1 11.62% 10.58% 11.84% 11.56% Level-2 0.35% 0.37% 0.32% 0.34% Level-3 0% 0% 0% 0% M2: Covering the whole image with another image, as depicted in Fig. 8(c). M3: Covering the whole image with fruit patterns, as depicted in Fig. 8(d). M4: Spreading plenty of mist to the whole image, as depicted in Fig. 8(e). The test results are listed in Table 2 and summarized as follows: (a) With only level-1 detection, the maximum rate of miss detection is less than 12%. Fig. 9. 10–50% Tampered Lena with two types of tampering dis- (b) With both level-1 and level-2 detections, the maximum tribution: single-tampered-chunk and spread-tampered-blocks. miss detection rate drops significantly to 0.37%. (c) With level-1, -2, and -3 detections, all tampered blocks are detected. (a) The recovering rate for single-tampered images is bet- 4.3. Performance of restoration on distribution of ter than 99% when the rate of tampering is less than 16%, is tampered blocks about 94% when the rate of tampering is 40%, and is about 93% when the rate of tampering increases to 50%. In this experiment, we want to find out how well a tam- (b) The recovering rate for spread-tampered images is pered image can be recovered with respect to different sizes better than 99% when the rate of tampering is less than and distributions of tampering. The tampered blocks can be 30%, is about 96% when the rate of tampering is 40%, and in a form of either single tampered chunk or spread tam- is about 94% when the rate of tampering increases to 50%. pered blocks. We altered image Lena 10–50% in total with (c) The recovering rate for spread-tampered images is both types of tampering distribution, as shown in Fig. 9. almost twice as better as that for single-tampered images The recovering rates of both types of tampering distribu- when the rate of tampering is less than 30%, is 30% better tion with respect to the rate of tampering are depicted in when the rate of tampering is between 30% and 50%, and Figs. 10 and 11, and can be summarized as follows. is 20% better when the rate of tampering increases to 50%.
  • 8. 2526 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529 700 650 The number of blocks without restoring 600 550 500 (total blocks=4096) 450 400 350 300 250 200 150 100 50 0 16% 26% 30% 37% 39% 41% 48% 51% 54% 57% 60% 63% 70% The numberof altered blocks/ the number of total blocks Fig. 10. The number of un-recovered blocks for single-tampered-chunk. The number of blocks without restoring (total blocks=4096) 250 200 150 100 50 0 20% 24% 28% 30% 33% 36% 39% 41% 45% 48% 50% The number of altered blocks / the number of total blocks Fig. 11. The number of un-recovered blocks for spread-tampered-blocks. 5. Performance analyses images. In this section, we analyze the performance of our method 2552 PSNR = 10 × log10 dB, (6) from aspects of the fidelity of watermarked images, the qual- MSE ity of recovered images, as well as the tamper detection rate. j <m where MSE = (1/m × n) i<n j =0 (cij − cij )2 , m, n i=0 are the width and the length of the image, respectively, 5.1. Image quality analysis and c, c are the pixel intensities of the two images under comparison. We use PSNR defined in Eq. (6) as the indicator of (a) PSNR of the watermarked image. Since only two LSBs the quality of both watermarked images and recovered of each pixel are used for embedding the watermark, the
  • 9. P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529 2527 Table 3 The probability of failing both the parity check and the The PSNRs of the watermarked images intensity-relation check simultaneously is at most (1/2) × Image Home Fingerprint Car Beach (1/2) = 1/4. So the probability of false detection for all four sub-blocks will be at most (1/4)4 0.39%, based on PSNR (in dB) 44.36 44.36 44.39 44.37 the production rule of statistics. Thus, almost all erroneous blocks can be detected after level-2 inspection. (c) Level-3 detection: From (b), we know that the PSNRs of the watermarked images are all better than 44 dB, probability of failing to detect one tampered block af- as listed in Table 3. As compared with the scheme in Ref. ter level-2 detection is at most 1/256. Thus, the miss [20] that only uses one LSB to embed the watermark, the detection rate after level-3 detection is the probabil- quality of the images watermarked by our scheme is de- ity of failing to detect more than four tampered blocks graded about 5–6 dB. within the 3 × 3-block-neighborhood, which is less than (b) PSNR of the recovered image. The PSNR of a re- C(9,4)(1/256)4 >1/225 0. covered image depends how well the tampered blocks are From the experimental results in Table 2, we find that the recovered. The recovery depends on how accurately those maximum missing rate after level-1, -2, and -3 detection is tampered blocks are detected. And, the tampering detection 12%, 0.37%, and 0%, respectively, which are quite consis- depends on both the size and the distribution of tampering. tent with the calculated probability derived for each level. Table 4 lists the PSNR of five recovered images with var- Thus, we summarize the detection capability of our method ious sizes and distributions of tampering. From this table, as follows: we find that among all the single tampered images, Home has the best PSNR of 48.48 dB, which is recovered from • Our method can detect any tampering of size 12 × 12 a tampered chunk of 4 × 12 pixels. Car-1 has the second pixels or bigger without a single miss. best PSNR of 38.12 dB, which is recovered from a tampered • Our method can detect any tampering of size 4 × 4 pixels chunk of size 24 × 16. Car-2 has PSNR of 32.52 dB, which with a missing rate less than 0.37%. is recovered from a tampered chunk of size 68 × 20. Beach • Our method can detect any tampering of size 2 × 2 pixels has the worst PSNR of 30.85 dB, which is recovered from with a missing rate less than 12%. a tampered chunk of size 68 × 68. For spread tampering, Fingerprint has PSNR of 36.46 dB, which is recovered from a total tampered area of size 70 × 16. Comparing the re- 6. Conclusion sults of Fingerprint and Car-2, we find that the PSNR of Fingerprint is much better than that of Car-2, even though We have presented a hierarchical digital watermarking the sizes of total tampering for both images are not much scheme for both image tamper detection and restoration in different. this paper. Our scheme is efficient in execution time since it only uses simple operations such as parity check and 5.2. Tamper detection analysis comparisons. It is effective in detection accuracy since it inspects the image hierarchically with the inspection view We analyze the detection algorithm from the following grows along with the hierarchy. It is also very storage effec- aspects: tive since it only requires a secret key and a public chaotic (a) Level-1 detection: If the type of error is parity error, mixing algorithm for both tamper detection and recovery. then we are sure that the sub-block is indeed erroneous. The experimental results demonstrate that the precision of (b) Level-2 detection: If the type of error is intensity- tamper detection and localization is close to 100% after relationship error, we cannot be sure whether the sub-block level-2 inspection and the tamper recovery rate is better than under inspection is erroneous or other sub-blocks within the 93% for a less than half tampered image. As compared with same block are erroneous. However, some pixels within the the method in Ref. [20], our method is not only as simple block must be wrong. Thus, in case the tampered sub-block and as effective in tamper detection and localization, it also is not detected in level-1 inspection, the whole block will provides with the capability of tamper recovery by trading be marked erroneous after level-2 inspection. off the quality of the watermarked images about 5 dB. Our Table 4 The PSNRs of the recovered images relative to the watermarked images Image Home Fingerprint Car-1 Car-2 Beach Size of tamper 4 × 12 70 × 16 24 × 16 68 × 20 68 × 68 PSNR (in dB) 48.48 36.46 38.12 32.52 30.85
  • 10. 2528 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529 future research includes improvements on both security and [13] M.M. Yeung, F. Mintizer, An invisible watermarking watermark-payload reduction while maintaining the capa- technique for image verification, in: Proceedings of the IEEE bility of both tamper detection and recovery. International Conference on Image Processing, vol. I, Santa Barbara, CA, October 1997, pp. 680–683. [14] R.L. Lagendijk, G.C. Langelaar, I. Setyawan, Watermarking digital images and video data, IEEE Signal Process. Mag. 17 (2000) 20–46. References [15] F. Hartung, M. Kutter, Multimedia watermarking techniques, Proc. IEEE 87 (1999) 1079–1107. [1] G.I. Friedman, The trustworthy digital camera: restoring [16] M.D. Swanson, M. Kobayashi, A.H. Tewfik, Multimedia data credibility to the photographic image, in: Proceedings of the embedding and watermarking technologies, Proc. IEEE 86 IEEE International Conference on Image Processing, vol. II, (1988) 1064–1087. Chicago, IL, USA, October 1998, pp. 409–413. [17] I.J. Cox, M.I. Miller, A.L. Mckellips, Watermarking as [2] J. Dittmann, A. Steinmetz, R. Steinmetz, Content-based communications with side information, Proc. IEEE 87 (1999) digital signature for motion pictures authentication and 1127–1147. content-fragile watermarking, in: Proceedings of the IEEE International Conference on Multimedia Computing Systems, [18] C.De. Vleeschouwer, J.F. Delaigle, B. Macq, Invisibility and 1999, pp. 209–213. application functionalities in perceptual watermarking—an [3] C.Y. Lin, S.F. Chang, A robust image authentication method overview, Proc. IEEE 90 (1) (2002) 64–77. surviving JPEG lossy compression, Proc. SPIE 3312 (1998) [19] C.W. Wu, D. Coppersmith, F.C. Mintizer, C.P. Tresser, M.M. 296–307. Mueng, Fragile imperceptible digital watermark and privacy [4] C.S. Lu, H.Y.M. Liao, C.J. Sze, Structural digital signature for control, Proceedings of the SPIE, Security and Watermarking image authentication: an incidental distortion resistant scheme, of Multimedia Contents, vol. 3657, January 1999, pp.79–84. in: Proceedings of the Multimedia Security Workshop 8th [20] M.U. Celik, G. Sharma, E. Saber, A.M. Tekalp, ACM International Conference on Multimedia, Los Angeles, Hierarchical watermarking for secure image authentication CA, 2000, pp. 115–118. with localization, IEEE Trans. Image Process. 11 (6) (2002) [5] W. Stallings, Network Security Essentials: Application and 585–594. Standards, Prentice-Hall, Upper Saddle River, NJ, 2000. [21] D. Kundur, D. Hatzinakos, Digital watermarking for telltale [6] J. Fridrich, Image watermarking for tamper detection, in: tamper proofing and authentication, Proc. IEEE 87 (1999) Proceedings of the IEEE International Conference on Image 1167–1180. Processing, vol. II, Chicago, IL, USA, October 1998, pp. [22] J. Eggers, B. Girod, Blind watermarking applied to image 404–408. authentication, in: Proceedings of the IEEE ICASSP, Salt Lake [7] J. Fridrich, M. Goljan, A.C. Baldoza, New fragile City, UT, May 2001, pp. 1977–1980. authentication watermark for images, in: Proceedings of the IEEE International Conference on Image Processing, [23] S. Bhattacharjee, M. Kutter, Compression tolerant image Vancouver, BC, Canada, September 2000, pp. 10–13. authentication, in: Proceedings of the IEEE International [8] D. Kundur, D. Hatzinakos, Toward a telltale watermarking Conference on Image Processing, Chicago, IL, October 1998, technique for tamper-proofing, in: Proceedings of the IEEE pp. 435–439. International Conference on Image Processing, vol. 2, 1998, [24] C.S. Lu, H.Y. Liao, Multipurpose watermarking for image pp. 409–413. authentication and protection, IEEE Trans. Image Process. 10 [9] E. Lin, E.J. Delp, A review of fragile image watermarks, in: (2001) 1579–1592. Proceedings of the ACM Multimedia and Security Workshop, [25] M. Holliman, N. Memon, Counterfeiting attacks on oblivious Orlando, FL, November 1999, pp. 35–40. block-wise independent invisible watermarking schemes, [10] M.P. Queluz, Content-based integrity protection of digital IEEE Trans. Image Process. 9 (2000) 432–441. image, Proceedings of the SPIE, Security and Watermarking [26] G. Voyatzis, l. Pitas, Chaotic mixing of digital images of Multimedia Contents II, vol. 3971, Bellingham, WA, 2000, and applications to watermarking, in: Proceedings of the pp. 85–93. European Conference on Multimedia Applications Services [11] M. Schneider, S.F. Chang, A robust content based digital and Techniques (ECMAST’96), 1996, pp. 687–689. signature for image authentication, in: Proceedings of the [27] P.W. Wong, N. Memon, Secret and public key authentication IEEE International Conference on Image Processing, vol. III, schemes that resist vector quantization attack, Proc. SPIE 3971 Lausanne, Switzerland, September 1996, pp. 227–230. (75) (2002) 417–427. [12] P.W. Wong, A public key watermark for image verification and authentication, in: Proceedings of the IEEE International [28] G. Voyatzis, I. Pitas, Applications of toral automorphisms Conference on Image Processing, Chicago, IL, October 1998, in image watermarking, in: Proceedings of the International pp. 455–459. Conference on Image Processing, vol. II, 1996, pp. 237–240. About the Author—PHEN LAN LIN received the B.S. degree in Engineering Science from National Cheng-Kung University, Taiwan in 1973, the M.S. degree in Mathematics from Texas Tech University, Texas in 1978, and both the M.S. and Ph.D. degrees in Electrical Engineering from Southern Methodist University, Dallas, Texas in 1992 and 1994, respectively.
  • 11. P.L. Lin et al. / Pattern Recognition 38 (2005) 2519 – 2529 2529 Dr. Lin was with Texas Instruments (TI) in Dallas, Texas as a member of technical staff, lead engineer, and project manager from 1978 to 1992. Her working experiences include control and computer vision software development, mobile robot navigation, as well as automatic IC inspection project management. She has been a professor in the Department of Computer Science and Information Management, Providence University, Taiwan since 2001 and is a professor in the Department of Computer Science and Information Engineering. She has also been serving as the Director of Computer and Communication Center in the university since 2001. Her current research interests are in the fields of multimedia security, network security, medical imaging, and visual inspection. About the Author—CHUNG-KAI HSIEH received the B.S. degree in Computer Science and Information Management from Providence University, Taiwan in 2002 and the M.S. degree in Computer Science from Chung Hsing University, Taiwan in 2004. His research interests are in the fields of multimedia and network security. About the Author—PO-WHEI HUANG received the B.S. degree in Applied Mathematics from National Chung-Hsing University in 1973, the MS degree in mathematics from Texas Tech University in 1978, and the Ph.D. degree in Computer Science and Engineering from Southern Methodist University in 1989. He was with Texas Instruments in Dallas as a member of technical staff, supervisor, lead engineer, section manager, and software development manager from 1978 to 1991. His working experiences include bubble memory testing and application, IC design automation, Lisp machine on a chip design, automatic program generation, production planning and scheduling, and wafer factory automation. He was the department head and has been a professor in the Computer Science Department at National Chung-Hsing University. Since September 2002, he has also been serving as the vice president of National Huwei University of Science and Technology located in Yunlin County of Taiwan. His current research interests are in the fields of multimedia database, medical imaging, visual inspection, pattern recognition, and artificial intelligence.