An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC

  • PDF / 3,288,039 Bytes
  • 30 Pages / 439.37 x 666.142 pts Page_size
  • 106 Downloads / 159 Views

DOWNLOAD

REPORT


An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC Chin-Chen Chang 1,2 & Chia-Chen Lin 3

& Guo-Dong Su

2,4

Received: 15 July 2019 / Revised: 18 April 2020 / Accepted: 27 May 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

The quality of the watermarked image is degraded by introducing a large amount of the watermark, which also draws more attention of malicious attackers. Therefore, it is important to improve the quality of a watermarked image and improve the restoration capability of a tampered image. For this, a novel self-recovery based fragile watermarking scheme is proposed in this paper. To improve the watermarked image quality, a bit-reduction based AMBTC technology is employed to generate a watermark with fewer bits. The watermark is then embedded into the original image using turtle shell based data hiding technique. In the tampering detection phase, the high accuracy for tampering localization is achieved employing a two-level tampering detection strategy. Additionally, an effective self-adaptive weight-based recovery algorithm and an image inpainting algorithm are sequentially employed to provide improved recovered image quality. The experimental results show that the watermarked images appear to demonstrate higher quality (up to 49.76 dB), and the average PSNR of recovered images can be up to 34.65 dB, which is higher than that of the state-of-the-art methods. Keywords Fragile watermarking . Self-recovery . Bit-reduction based AMBTC technology . Selfadaptive weight

1 Introduction Recently, with continuous advancements in how information is disseminated and the increasing popularity of the internet, information acquisition and information sharing via multiple

* Chia-Chen Lin [email protected] Chin-Chen Chang [email protected] Guo-Dong Su [email protected] Extended author information available on the last page of the article

Multimedia Tools and Applications

social platforms has become extremely easy and fast. While enjoying the convenience of digitalization, the challenges of protecting information security [15, 25, 28] and personal privacy are now also increasingly urgent. Therein, steganography [8, 27, 29], as an effective solution, provides the essential security to the information. Besides, with the development of image processing and analysis tools, it has become easier to manipulate image content almost imperceptibly. Although people become increasingly aware of their rights, there is little to discourage intentional and unintentional tampering. Figure 1 illustrates an instance of forgery, in which the picture is forged by showing four airplanes instead of one in the original image. Figure 1(a) is the tampered image, and Fig. 1(b) is the original image. Such scenarios form the basis for research into image authentication techniques to verify the integrity of an image, and to also locate tampered areas in an image and restore the image to a satisfactory perceptual quality. Generally, image authenti