Skip to main content

A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and Restoration

  • Chapter
  • First Online:
Applied Computation and Security Systems

Abstract

The provision of image tamper detection, localization and restoration forms an important requirement for modern multimedia and communication systems. A discrete wavelet transform (DWT)-based watermarking scheme for this purpose is proposed in this communication. In our scheme, the original image is first partitioned into blocks of size 2 × 2 in which a 1D DWT is applied to produce a watermark which is embedded in four disjoint partitions of the image to enhance the chance of restoration of the image from different cropping attack-based tampers. The validity and superiority of the proposed scheme is verified through extensive simulations using different images of two extensively used image databases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, K.F., Chen, T.S., Wu, S.C.: Image tamper detection and recovery system based on discrete wavelet transformation. In: IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 26–28 Aug 2001. doi:10.1109/PACRIM.2001.953548 (2001)

  2. Gang-chui, S., Mi-mi, Z.: Novel fragile authentication watermark based on chaotic system. In: International Symposium on Industrial Electronics, 4–7 May 2004. doi:10.1109/ISIE.2004.1572034 (2004)

  3. Chen, T.S., Chen, J., Chen, J.G.: Tamper detection and retrieval technique based on JPEG2000 with LL subband. In Proceedings of IEEE International Conference OD Networking, Sensing & Control, Taipei, Taiwan (2004)

    Google Scholar 

  4. Tsai, P., Hu, Y.C.: A watermarking-based authentication with malicious detection and recovery. In: 5th International Conference on Information, Communications and Signal Processing. doi:10.1109/ICICS.2005.1689172 (2005)

  5. Tsai, M.J., Chien, C.C.: A wavelet-based semi-fragile watermarking with recovery mechanism. In: IEEE International Symposium on Circuits and Systems, ISCAS 2008. doi:10.1109/ISCAS.2008.4542097 (2008)

  6. Qi, X., Xin, X., Chang, R.: Image authentication and tamper detection using two complementary watermarks. In: 16th IEEE International Conference on Image Processing (ICIP). doi:10.1109/ICIP.2009.5413681 (2009)

  7. Cruz, C., Mendoza, J.A., Miyatake, M.N., Meana, H.P., Kurkoski, B.: Semi-fragile watermarking based image authentication with recovery capability. In: International Conference on Information Engineering and Computer Science. doi:10.1109/ICIECS.2009.5363496 (2009)

  8. Wang, N., Kim, C.W.: Tamper detection and self-recovery algorithm of color image based on robust embedding of dual visual watermarks using DWT-SVD. In: 9th International Symposium on Communications and Information Technology. doi:10.1109/ISCIT.2009.5341268 (2009)

  9. Yuping, H., Guangjun, G.: Watermarking-based authentication with recovery mechanism. In: 2nd International Workshop on Computer Science and Engineering. doi:10.1109/WCSE.2009.856 (2009)

  10. Hui, L., Yuping, H.: A wavelet-based watermarking scheme with authentication and recovery mechanism. In: International Conference on Electrical and Control Engineering (ICECE). doi:10.1109/iCECE.2010.86 (2010)

  11. Wang, L.J., Syue, M.Y.: Image authentication and recovery using wavelet-based multipurpose watermarking. In: 10th International Joint Conference on Computer Science and Software Engineering (JCSSE). doi:10.1109/JCSSE.2013.6567315 (2013)

  12. Lee, T., Lin, S.D.: Dual watermark for image tamper detection and recovery. Pattern Recogn. 41, 3497–3506 (2008)

    Article  MATH  Google Scholar 

  13. USC-SIPI image database: Available at http://sipi.usc.edu/database. Accessed on 1 Jan 2012

  14. Computational Perception and Image Quality Lab, Oklahoma State University, www.vision.okstate.edu. Accessed on 1 Jan 2012

  15. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sukalyan Som .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this chapter

Cite this chapter

Som, S., Palit, S., Dey, K., Sarkar, D., Sarkar, J., Sarkar, K. (2015). A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and Restoration. In: Chaki, R., Saeed, K., Choudhury, S., Chaki, N. (eds) Applied Computation and Security Systems. Advances in Intelligent Systems and Computing, vol 305. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1988-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1988-0_2

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1987-3

  • Online ISBN: 978-81-322-1988-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics