Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/98260
標題: 有效的自嵌入認證水印用於圖像竄改檢測與恢復
Effective Self-Embedding Authentication Watermarking for Image Tampered Detection and Recovery
作者: 陳昭如
Zhao-Ru Chen
關鍵字: 影像認證技術
竄改檢測
脆弱型浮水印
Image authentication scheme
Tamper detection
Fragile watermarking method
引用: [1] F. Hartung and M. Kutter, 'Multimedia watermarking techniques,' Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, 1999. [2] S. Ababneh, R. Ansari, and A. Khokhar, 'Iterative compensation schemes for multimedia content authentication,' Journal of Visual Communication and Image Representation, vol. 20, no. 5, pp. 303-311, 2009. [3] D.-C. Lou and J.-L. Liu, 'Fault resilient and compression tolerant digital signature for image authentication,' IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31-39, 2000. [4] P. Tsai, Y. Hu, and C. Chang, 'Novel image authentication scheme based on quadtree segmentation,' The Imaging Science Journal, vol. 53, no. 3, pp. 149-162, 2005. [5] A. Umamageswari and G. R. Suresh, 'Secure medical image communication using roi based lossless watermarking and novel digital signature,' (in English), Journal of Engineering Research, Article vol. 2, no. 3, pp. 87-108, Sep 2014. [6] C. Das, S. Panigrahi, V. K. Sharma, and K. K. Mahapatra, 'A novel blind robust image watermarking in dct domain using. Inter-block coefficient correlation,' Aeu-International Journal of Electronics and Communications, vol. 68, no. 3, pp. 244-253, 2014. [7] A. Mishra, C. Agarwal, A. Sharma, and P. Bedi, 'Optimized gray-scale image watermarking using dwt-svd and firefly algorithm,' Expert Systems with Applications, vol. 41, no. 17, pp. 7858-7867, Dec 2014. [8] S. A. Parah, J. A. Sheikh, N. A. Loan, and G. M. Bhat, 'Robust and blind watermarking technique in dct domain using inter-block coefficient differencing,' Digital Signal Processing, vol. 53, pp. 11-24, Jun 2016. [9] A. K. Singh, 'Improved hybrid algorithm for robust and imperceptible multiple watermarking using digital images,' Multimedia Tools and Applications, vol. 76, no. 6, pp. 8881-8900, Mar 2017. [10] A. K. Singh, B. Kumar, M. Dave, and A. Mohan, 'Robust and imperceptible dual watermarking for telemedicine applications,' Wireless Personal Communications, vol. 80, no. 4, pp. 1415-1433, Feb 2015. [11] A. Zear, A. K. Singh, and P. Kumar, 'A proposed secure multiple watermarking technique based on dwt, dct and svd for application in medicine,' Multimedia Tools and Applications, vol. 77, no. 4, pp. 4863-4882, Feb 2018. [12] X. Zhu, A. T. S. Ho, and P. Marziliano, 'A new semi-fragile image watermarking with robust tampering restoration using irregular sampling,' Signal Processing-Image Communication, vol. 22, no. 5, pp. 515-528, Jun 2007. [13] F. Peng, R. S. Guo, C. T. Li, and M. Long, 'A semi-fragile watermarking algorithm for authenticating 2d cad engineering graphics based on log-polar transformation,' Computer-Aided Design, vol. 42, no. 12, pp. 1207-1216, Dec 2010. [14] R. O. Preda, 'Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain,' Measurement, vol. 46, no. 1, pp. 367-373, Jan 2013. [15] H. M. Al-Otum, 'Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique,' Journal of Visual Communication and Image Representation, vol. 25, no. 5, pp. 1064-1081, Jul 2014. [16] X. J. Qi and X. Xin, 'A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization,' Journal of Visual Communication and Image Representation, vol. 30, pp. 312-327, Jul 2015. [17] T.-Y. Lee and S. D. Lin, 'Dual watermark for image tamper detection and recovery,' Pattern recognition, vol. 41, no. 11, pp. 3497-3506, 2008. [18] X. Zhang, S. Wang, and G. Feng, 'Fragile watermarking scheme with extensive content restoration capability,' in International Workshop on Digital Watermarking, 2009, pp. 268-278: Springer, 2009. [19] C.-W. Yang and J.-J. Shen, 'Recover the tampered image based on vq indexing,' Signal Processing, vol. 90, no. 1, pp. 331-343, 2010. [20] S. Yang, C. Qin, Z. Qian, and B. Xu, 'Tampering detection and content recovery for digital images using halftone mechanism,' in Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on, 2014, pp. 130-133: IEEE, 2014. [21] C.-S. Hsu and S.-F. Tu, 'Image tamper detection and recovery using adaptive embedding rules,' Measurement, vol. 88, pp. 287-296, 2016. [22] D. Singh and S. K. Singh, 'Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability,' Journal of Visual Communication and Image Representation, vol. 38, pp. 775-789, 2016. [23] C. Qin, P. Ji, X. Zhang, J. Dong, and J. Wang, 'Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy,' Signal Processing, vol. 138, pp. 280-293, 2017. [24] C. Kim, D. Shin, and C.-N. Yang, 'Self-embedding fragile watermarking scheme to restoration of a tampered image using ambtc,' Personal and Ubiquitous Computing, vol. 22, no. 1, pp. 11-22, 2018. [25] Z. Qian, G. Feng, X. Zhang, and S. Wang, 'Image self-embedding with high-quality restoration capability,' Digital Signal Processing, vol. 21, no. 2, pp. 278-286, 2011. [26] C.-C. Lo and Y.-C. Hu, 'A novel reversible image authentication scheme for digital images,' Signal processing, vol. 98, pp. 174-185, 2014. [27] Z. Yin, X. Niu, Z. Zhou, J. Tang, and B. Luo, 'Improved reversible image authentication scheme,' Cognitive Computation, vol. 8, no. 5, pp. 890-899, 2016. [28] C.-K. Chan and L.-M. Cheng, 'Hiding data in images by simple lsb substitution,' Pattern recognition, vol. 37, no. 3, pp. 469-474, 2004. [29] C.-C. Chang, Y.-S. Hu, and T.-C. Lu, 'A watermarking-based image ownership and tampering authentication scheme,' Pattern Recognition Letters, vol. 27, no. 5, pp. 439-446, 2006. [30] R. Keys, 'Cubic convolution interpolation for digital image processing,' IEEE transactions on acoustics, speech, and signal processing, vol. 29, no. 6, pp. 1153-1160, 1981. [31] F. A. Petitcolas and S. Katzenbeisser, Information hiding techniques for steganography and digital watermarking (artech house computer security series). Artech House, 2000.
摘要: 近年來,隨著網際網路的發展快速,影像處理技術也蓬勃發展,現在在智慧型手機上也可以輕鬆修改影像。但是正因為如此,有心人士想要蓄意竄改影像的機會就會大幅增加。本研究提出了可自我回復的脆弱型浮水印影像認證法,並且分為基於區塊和基於像素的檢測法。在區塊檢測法中,從每個區塊中產生認證資訊以及利用區塊平均值來產生回復資訊,並且根據區塊大小的不同,來調整要認證資訊及回復資訊的數量。透過實驗結果可以發現,因為當檢測到被竄改像素時,則該像素所屬的區塊會整個被標記為被竄改區塊,因此若區塊劃分的較小,則檢測的誤判率FPR則會較小。而像素檢測法則當檢測到被竄改像素值時僅將該像素標記為被竄改,因此誤判率會比區塊檢測法來得少。與現有的方法相比,本方法在較高的竄改率下,仍可以有較好的竄改檢測及回復的性能。
In recent years, with the rapid development of the Internet as well as image processing technology, digital images on smart phones can be easily modified. Thus, criminal image modification has skyrocketed. In this paper, we propose an effective self-embedding authentication watermarking scheme for tampered image detection and recovery. The proposed method is classified into block-wise and pixel-wise detections. In block-wise detection, the authentication information and the recovery information are generated from each block and its mean value, respectively. According to the size of a block, the number of the authentication information and recovery information are adjusted. When the tampered pixel is detected, the corresponding block is marked; therefore, if the size of the block is small, the false positive rate (FPR) will be low. In pixel-wise detection, when the tampered pixel is detected, only the corresponding pixel area is marked. Therefore, the FPR will be lower than that the block-wise detection. The experimental results demonstrate that the proposed method is effective, and an accurate tamper detection and high-quality recovery can be realized even in highly tampered images.
URI: http://hdl.handle.net/11455/98260
文章公開時間: 2021-08-14
Appears in Collections:資訊管理學系

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.