Active Approach for Tamper Detection with Robustness to Lossy Compression

Expand
  • (1. Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200240, China; 2. The Third Research Institute of Ministry of Public Security of P.R.C, Shanghai 200031, China)

Online published: 2013-08-12

Abstract

Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tampered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. Experimental results demonstrate the effectiveness of the proposed scheme.

Cite this article

LI Jian1,2* (李 剑), LI Sheng-hong1 (李生红), ZHENG Xu-ping1,2 (郑旭平) . Active Approach for Tamper Detection with Robustness to Lossy Compression[J]. Journal of Shanghai Jiaotong University(Science), 2013 , 18(4) : 385 -393 . DOI: 10.1007/s12204-013-1421-2

References

[1] Bayram S, Avcibas I, Sankur B, et al. Image manipulation detection [J]. Journal of Electronic Imaging, 2006, 15(4): 041102.
[2] Zhang X P, Wang S Z. Statistical fragile watermarking capable of locating individual tampered pixels [J]. IEEE Signal Processing Letters, 2007, 14(10): 727-730.
[3] He H J, Zhang J S, Chen F. A chaos-based fragile watermarking scheme with recovery [C]// Fourth International Conference on Fuzzy Systems and Knowledge Discovery. [s.l.]: IEEE, 2007: 303-307.
[4] Tsai J S, Huang W B, Chen C L, et al. A featurebased digital image watermarking for copyright protection and content authentication [C]//IEEE International Conference on Image Processing. Texas: IEEE, 2007: 469-472.
[5] Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication [J]. Proceedings of The IEEE, 1999, 87(7): 1167-1180.
[6] Zou D K, Shi Y Q, Ni Z C, et al. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(10): 1294-1300.
[7] Ho A T S. Semi-fragile watermarking and authentication for law enforcement applications [C]//Second International Conference on Innovative Computing Information and Control. Kumamoto: IEEE, 2007: 286.
[8] Ni Z C, Shi Y Q, Ansari N, et al. Robust lossless image data hiding designed for semi-fragile image authentication [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(4): 497-509.
[9] Zhang C, Cheng L L, Qiu Z D, et al. Multipurpose watermarking based on multiscale curvelet transform [J]. IEEE Transactions on Information Forensics and Security, 2008, 3(4): 611-619
[10] Proakis J G. Digital communications [M]. Zhang Lijun, Zhang Zong-cheng, Zheng Bao-yu, et al. (trans). Beijing: Publishing House of Electronics Industry, The McGraw-Hill Companies Inc., 2001: 353-355 (in Chinese).
Options
Outlines

/