A novel triple recovery information embedding approach for self-embedded digital image watermarking
- PDF / 6,632,497 Bytes
- 26 Pages / 439.37 x 666.142 pts Page_size
- 41 Downloads / 155 Views
A novel triple recovery information embedding approach for self-embedded digital image watermarking Ertugrul Gul 1,2 & Serkan Ozturk 2 Received: 13 January 2020 / Revised: 1 July 2020 / Accepted: 6 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract
Image tamper detection and recovery has become an important issue in recent years. In order to detect and recover high tampering rated images, this paper presents a novel selfembedded fragile watermarking method with triple recovery information embedding approach. In this proposed method host image is divided into sixteen main blocks. Four partner blocks are selected from main blocks as a partner group using Look-Up table which is constructed for recovery against high tampering rated images. Each partner block is divided into 4 × 4 blocks. Recovery data of each partner block is generated from the mean values of the 4 × 4 blocks. Then, triple recovery information for each partner block is constructed by combining recovery data of the three other partner blocks. After the generation of the recovery information, each partner block is divided into 16 × 16 blocks. Then, these blocks are divided into four 8 × 8 sub-blocks. Recovery bits for each partner block are embedded into the first and second least significant bits (LSBs) of the first three sub-blocks. It means that triple copies of recovery information for each partner block are embedded into three other blocks in the image, which provides triple chance for recovery of the tampered areas. On the other hand, authentication information is generated from the pixels of the 16 × 16 recovery information embedded image blocks by using MD5 hash function. This authentication information is embedded into the quarter part of each 16 × 16 block by using LSB substitution. The performance of the proposed method has been demonstrated by applying different size of cropping attacks to the different areas of the watermarked images. Experimental results show that the proposed method satisfactory recovers up to 75% tampering rated images. Keywords Integrity . Self-embedding . Watermarking . Triple recovery
* Ertugrul Gul [email protected] Serkan Ozturk [email protected] Extended author information available on the last page of the article
Multimedia Tools and Applications
1 Introduction In recent years, due to advances in internet technology and powerful image editing tools, protection of image integrity has become an important challenge in many application areas where manipulating content may lead to inadmissible consequences [5]. In order to authenticate the image content, digital signature based cryptographic methods have been developed [39, 51]. In signature-based methods, authentication is performed by comparing the attached signature information with the re-generated signature information. However, this type of methods cannot localize the tampered areas of the images [31]. Therefore, in order to overcome this challenge, researchers have proposed fragile watermarking methods [7,
Data Loading...