Advertisement

Semi-fragile Watermarking Algorithm Based on Arnold Scrambling for Three-Layer Tamper Localization and Restoration

  • Bin Feng
  • Xiangli Li
  • Yingmo Jie
  • Cheng Guo
  • Huijuan Fu
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 234)

Abstract

To protect the content integrity, authenticity and improve the effect of tamper localization and recovery, this paper designs and implements a semi-fragile watermark based on Arnold transformation, which is used to localize and recover tamper of confused image and plain-image. The sender encodes the watermark into the 2-bit least significant bit of the pixel of the original image, and the authentication watermark consists of the pixel value comparison result and the parity check code; the recovery watermark is the pixel value of the Torus image block. In the detection side, the plain-image adopts the stratified idea, carries on the three-level tamper localization and recovery, the third-party authentication institution can detect tamper of the scrambled image using the layer detection method, the receiver will detect the positioning result again. The experimental results show that the proposed algorithm can accurately locate tamper and realize the content recovery and effectively prevent the vector quantization attack. Compared with other algorithms, this algorithm has better effect of tamper localization and recovery.

Keywords

Semi-fragile watermark Arnold scrambling Hierarchical tamper localization Tamper recovery Torus self-isomorphism mapping 

Notes

Acknowledgements

This paper is supported by the National Science Foundation of China under grant No. 61401060, 61501080, 61572095 and 61771090, the Fundamental Research Funds for the Central Universities’ under No. DUT16QY09, and the Social Science Foundation of Jiangxi Province, China No. 15JY48.

References

  1. 1.
    Celik, M.U., et al.: Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process. 11(6), 585 (2002). A Publication of the IEEE Signal Processing SocietyCrossRefGoogle Scholar
  2. 2.
    Potdar, V.M., Han, S., Chang, E.: A survey of digital image watermarking techniques (2005)Google Scholar
  3. 3.
    Cox, I.J., Kilian, J., Leighton, F.T., et al.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997). A Publication of the IEEE Signal Processing SocietyCrossRefGoogle Scholar
  4. 4.
    Walton, S.: Information authentication for a slippery new age. Dr. Dobbs J. 20(4), 18–26 (1995)Google Scholar
  5. 5.
    Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proceedings of the International Conference on Image Processing, ICIP 1999, vol. 3, pp. 792–796. IEEE (2002)Google Scholar
  6. 6.
    Sikder, I., Dhar, P.K., Shimamura, T.: A semi-fragile watermarking method using slant transform and LU decomposition for image authentication. In: International Conference on Electrical, Computer and Communication Engineering, pp. 881–885. IEEE (2017)Google Scholar
  7. 7.
    Hore, A., Ziou, D.: Image quality metrics: PSNR vs. SSIM. In: International Conference on Pattern Recognition, pp. 2366–2369. IEEE (2010)Google Scholar
  8. 8.
    Liu, Q., Jiang, X., et al.: A unified digital watermark algorithm based on singular value decomposition and spread spectrum technology. Acta Electron. Sin. 4, 621–624 (2005)Google Scholar
  9. 9.
    Arnold, V.I.: Geometrical Methods in the Theory of Ordinary Differential Equations, 2nd edn., 351 pp. Springer, New York (1988).  https://doi.org/10.1007/978-1-4612-1037-5. Rota, G.C. Adv. Math. 80(2), 269 (1990)
  10. 10.
    Qiu, T., Zhao, A., Xia, F., Si, W., Wu, D.O.: ROSE: robustness strategy for scale-free wireless sensor networks. IEEE/ACM Trans. Networking 25(5), 2944–2959 (2017)CrossRefGoogle Scholar
  11. 11.
    Qiu, T., Qiao, R., Wu, D.O.: EABS: an event-aware backpressure scheduling scheme for emergency internet of things. IEEE Trans. Mobile Comput. 17(1) (2017).  https://doi.org/10.1109/TMC.2017.2702670
  12. 12.
    Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., Choo, K.-K.R.: Fine-grained database field search using attribute-based encryption for E-healthcare clouds. J. Med. Syst. 40(11), 235:1–235:8 (2016)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  • Bin Feng
    • 1
    • 2
  • Xiangli Li
    • 1
  • Yingmo Jie
    • 1
    • 2
  • Cheng Guo
    • 1
    • 2
  • Huijuan Fu
    • 3
    • 4
  1. 1.School of Software TechnologyDalian University of TechnologyDalianPeople’s Republic of China
  2. 2.Key Laboratory for Ubiquitous Network and Service Software of Liaoning ProvinceDalianPeople’s Republic of China
  3. 3.School of Information ManagementWuhan UniversityWuhanPeople’s Republic of China
  4. 4.School of Information EngineeringJiangxi University of Science and TechnologyGanzhouPeople’s Republic of China

Personalised recommendations