Skip to main content

New Paradigm for Self-embedding Image Watermarking with Poisson Equation

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12022))

Abstract

In this paper, we propose a new self-embedding image watermarking scheme based on reference sharing and Poisson equation. With Laplacian operator, the relationship of each pixel and its neighborhood in original image is established and can be converted to compression bits. Then, after scrambling, compression bits are interleaved through the reference sharing mechanism, which can introduce more redundancy into the reference bits to be embedded for future content recovery. Thus, the relationship between each compression bit and each reference bit is constructed so that the recoverable area for tampered image can be increased effectively. Tampered contents can be recovered with the Laplacian values of tampered blocks and the boundary values around tampered blocks based on tampering localization and Poisson equation solver. Experimental results demonstrate the effectiveness of the proposed scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proceedings of IEEE International Conference on Image Processing, pp. 792–796 (1999)

    Google Scholar 

  2. Chang, C.C., Hu, Y.S., Lu, T.C.: A watermarking-based image ownership and tampering authentication scheme. Pattern Recogn. Lett. 27(5), 439–446 (2006)

    Article  Google Scholar 

  3. Lin, P.L., Hsieh, C.K., Huang, P.W.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519–2529 (2005)

    Article  Google Scholar 

  4. Lee, T.Y., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41(11), 3497–3506 (2008)

    Article  MathSciNet  Google Scholar 

  5. Zhang, X.P., Wang, S.Z., Qian, Z.X., Feng, G.R.: Reference sharing mechanism for watermark self-embedding. IEEE Trans. Image Process. 20(2), 485–495 (2011)

    Article  MathSciNet  Google Scholar 

  6. Yang, C.W., Shen, J.J.: Recover the tampered image based on VQ indexing. Sig. Process. 90(1), 331–343 (2010)

    Article  Google Scholar 

  7. Korus, P., Dziech, A.: Adaptive self-embedding scheme with controlled reconstruction performance. IEEE Trans. Inf. Forensics Secur. 9(2), 169–181 (2014)

    Article  Google Scholar 

  8. Qin, C., Ji, P., Chang, C.C., Dong, J., Sun, X.M.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimedia 25(3), 36–48 (2018)

    Article  Google Scholar 

  9. Perez, P., Gangnet, M., Blake, A.: Poisson image editing. ACM Trans. Graph. 22(3), 313–318 (2003)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (61902239, 61672354). The authors would like to thank the anonymous reviewers for their valuable suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chuan Qin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cao, F., Wu, T., Qin, C., Qian, Z., Zhang, X. (2020). New Paradigm for Self-embedding Image Watermarking with Poisson Equation. In: Wang, H., Zhao, X., Shi, Y., Kim, H., Piva, A. (eds) Digital Forensics and Watermarking. IWDW 2019. Lecture Notes in Computer Science(), vol 12022. Springer, Cham. https://doi.org/10.1007/978-3-030-43575-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-43575-2_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-43574-5

  • Online ISBN: 978-3-030-43575-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics