Abstract
In this paper, we propose a new self-embedding image watermarking scheme based on reference sharing and Poisson equation. With Laplacian operator, the relationship of each pixel and its neighborhood in original image is established and can be converted to compression bits. Then, after scrambling, compression bits are interleaved through the reference sharing mechanism, which can introduce more redundancy into the reference bits to be embedded for future content recovery. Thus, the relationship between each compression bit and each reference bit is constructed so that the recoverable area for tampered image can be increased effectively. Tampered contents can be recovered with the Laplacian values of tampered blocks and the boundary values around tampered blocks based on tampering localization and Poisson equation solver. Experimental results demonstrate the effectiveness of the proposed scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proceedings of IEEE International Conference on Image Processing, pp. 792–796 (1999)
Chang, C.C., Hu, Y.S., Lu, T.C.: A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn. Lett. 27(5), 439–446 (2006)
Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519–2529 (2005)
Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)
Zhang, X.P., Wang, S.Z., Qian, Z.X., Feng, G.R.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485–495 (2011)
Yang, C.W., Shen, J.J.: Recover the tampered image based on VQ indexing. Sig. Process. 90(1), 331–343 (2010)
Korus, P., Dziech, A.: Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans. Inf. Forensics Secur. 9(2), 169–181 (2014)
Qin, C., Ji, P., Chang, C.C., Dong, J., Sun, X.M.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimedia 25(3), 36–48 (2018)
Perez, P., Gangnet, M., Blake, A.: Poisson image editing. ACM Trans. Graph. 22(3), 313–318 (2003)
Acknowledgments
This work was supported by the National Natural Science Foundation of China (61902239, 61672354). The authors would like to thank the anonymous reviewers for their valuable suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Cao, F., Wu, T., Qin, C., Qian, Z., Zhang, X. (2020). New Paradigm for Self-embedding Image Watermarking with Poisson Equation. In: Wang, H., Zhao, X., Shi, Y., Kim, H., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2019. Lecture Notes in Computer Science(), vol 12022. Springer, Cham. https://doi.org/10.1007/978-3-030-43575-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-43575-2_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43574-5
Online ISBN: 978-3-030-43575-2
eBook Packages: Computer ScienceComputer Science (R0)