A divide-and-conquer fragile self-embedding watermarking with adaptive payload
- 39 Downloads
This paper proposes a divide-and-conquer fragile self-embedding watermarking with adaptive payload for digital images. A graph-based visual saliency (GBVS) model is adopted to automatically classify image blocks into region of interest (ROI) and background (ROB). The divide-and-conquer mechanisms aim to protect the ROI blocks with higher priority, which is embodied in two procedures: backup information collection and payload allocation. We collect the ROI backup information without compression, and allocate payload in a water-filling order to preferentially maintain the visual quality of ROI. The collected backup information are encoded as reference bits through a measurement process, in which a flexible scaling factor adaptively modulates the size of payload. Auxiliary information, which records the ROI locations, is embedded into the host images together with the reference bits. Hash-based authentication bits are responsible for detecting tampered blocks. A legitimate recipient can sequentially restore the auxiliary information and the original image content as long as the tampering is not too severe. The qualitative and quantitative results demonstrate the effectiveness and the superiority of the proposed methods compared with the previous works.
KeywordsSelf-embedding Fragile watermarking Image authentication Content restoration
This work was supported in part by the National Natural Science Foundation of China (61806171), the Natural Science Foundation of Shanghai (18ZR1400300), the Program for the Fundamental Research of the Shanghai Committee of Science and Technology (15JC1400600), and the Fundamental Research Funds of the Central Universities (16D110412,17D110408).
- 4.Chen F, He H J, Huo Y R, Wang H X (2011) Self-recovery fragile watermarking scheme with variable watermark payload, 10th International Workshop on Digital-forensics and Watermarking, IWDW’11, pp 142–155Google Scholar
- 6.Fridrich J, Goljan M (1999) Images with self-correcting capabilities, In: Proceedings of 6th International Conference on Image Processing, ICIP’99, pp 792–796Google Scholar
- 9.He HJ, Zhang JS, Tai HM (2009) Self-recovery fragile watermarking using block-neighborhood tampering characterization, 11th International Workshop on Information Hidding, IH’09, pp 132–145Google Scholar
- 19.Niu DM, Wang HX, Cheng MQ, Shi CH (2018) Reference sharing mechanism-based self-embedding watermarking scheme with deterministic content reconstruction. Secur Commun Netw 2516324:12Google Scholar
- 31.Schölkopf B, Platt J, Hofmann T (2006) Graph-based visual saliency. Adv Neural Inf Process Syst 19:545–552Google Scholar
- 33.The USC-SIPI image database, [Online]. Available: http://sipi.usc.edu/database/
- 34.The Dataset from the 2nd Bows Content, [Online]. Available: http://bows2.ec-lille.fr/