块截断编码的图像自嵌入半脆弱水印算法
Image self-embedding semi-fragile watermarking algorithm based on block truncation coding
- 2022年27卷第1期 页码:203-214
纸质出版日期: 2022-01-16 ,
录用日期: 2021-11-05
DOI: 10.11834/jig.210483
移动端阅览
浏览全部资源
扫码关注微信
纸质出版日期: 2022-01-16 ,
录用日期: 2021-11-05
移动端阅览
王艺龙, 李震宇, 巩道福, 马世鑫, 刘粉林. 块截断编码的图像自嵌入半脆弱水印算法[J]. 中国图象图形学报, 2022,27(1):203-214.
Yilong Wang, Zhenyu Li, Daofu Gong, Shixin Ma, Fenlin Liu. Image self-embedding semi-fragile watermarking algorithm based on block truncation coding[J]. Journal of Image and Graphics, 2022,27(1):203-214.
目的
2
数字图像自嵌入水印技术是解决图像篡改检测和恢复问题的主要技术手段之一,现有的自嵌入水印技术存在着认证粒度不高、嵌入水印后的图像失真较大,且无法抵抗滤波等操作。为提高图像自嵌入水印的认证粒度以及抵抗滤波等处理操作的能力,提出了一种基于块截断编码的图像自嵌入半脆弱水印算法。
方法
2
水印生成与嵌入:首先,将图像进行块级别的二级划分,分别生成粒度为4×4和2×2的图像块;然后,利用块截断编码对每个4×4图像块进行压缩编码,生成2×2图像块的恢复水印,并对恢复水印进行哈希生成2×2图像块的认证水印;最后,将恢复水印和认证水印级联构成自嵌入水印,嵌入到映射块中。篡改认证与恢复:首先,将某个4×4图像块提取的水印与该块生成的水印比较,判别该图像块的2×2子块是否通过认证;最后,依据认证结果对2×2图像块实施恢复。
结果
2
该算法产生的水印图像的峰值信噪比(peak signal-to-noise ratio,PSNR)均高于44 dB,在50 % 的篡改率下,恢复后的图像质量可达到32.7 dB。该算法生成水印并在图像上嵌入大约需要3.15 s,恢复图像大约需要3.6 s。
结论
2
算法利用块截断编码,有效缩短了生成的水印长度,保证嵌入水印后图像的质量。此外,通过引入的可容忍修改阈值,使得水印能够对滤波等图像处理操作具有一定的鲁棒性,同时保证对图像的恶意篡改具有敏感性。最后通过与最近典型方法的对比实验,验证了算法在嵌入水印后图像质量、恢复图像质量等方面的优势。
Objective
2
Digital images have become the main interface for people to acquire and disseminate information. People can easily replace digital image content with fake to achieve a certain purpose via widespread availability of image processing and editing tools. Hence
it is one of the research hotspots in the field of information content security to judge the authenticity of the content of the digital image
and even restore the tampered area. Digital image self-embedding watermarking technology is one of the key technical implications constrained by low authentication accuracy and extremely quality loss without filtering. In order to improve the authentication accuracy and the resistance to filtering and other processing operations
a semi-fragile image self-embedding watermarking algorithm based on block truncation coding is proposed.
Method
2
1) Watermarking generation and embedding: the image is divided into 4×4 image blocks
and each 4×4 image block is further divided into 2×2 image blocks. Then
block truncation coding is used to compress and encode each image block as the self-embedding watermarking information of the image block
and hash the self-embedding watermarking as the authentication watermarking information of the image block. At last
the self-embedded watermarking information and the authentication watermarking information form the watermarking information
which is embedded in the mapping block. 2)Tampering detection and recovery: At the beginning
the authentication watermarking information of 4×4 blocks is compared to identify the tampering of the image block
and then set a threshold to determine the tampering of the 2×2 image blocks based on the block truncation coding information and restore it. The algorithm uses block truncation coding to effectively shorten the watermarking information generated for 4×4 image blocks. The watermarking information is just embedded in the lowest two bits of the pixel
the quality of the image is guaranteed following the embedded watermarking and 2×2 image targeted blocks based on interpolation of the quantized information
Eventually
the 2×2 image blocks is restored based on the authentication analysis. The algorithm uses block truncation coding
which effectively shortens the length of the generated watermarking and guarantee the quality of the image while the watermarking is embedded. In addition
the watermarking can be robust to image processing operations such as filtering via the introduction of a tolerable modification threshold in terms of the inspection for tampering of images.
Result
2
The illustrated algorithm demonstrates that the peak signal-to-noise ratio(PSNR) of watermarked images generated are all higher than 44 dB
and the quality of the restored image can reach 32.7 dB at tampering rate of 50 %. The algorithm takes about 3.15 s to generate and embed watermarking on an image
and it takes about 3.6 s to restore an image. The demonstration analyzes the authentication after smoothing filtering
and verifies that the algorithm has certain robustness to smoothing filtering
and the effect of resisting Gaussian filtering is the most qualified. The robustness of the mean and median filtering is the strongest when the filter core is 3×3
and more than 90 % of the image blocks can be authenticated. The robustness of the mean and median filtering still decreases with the increase of the filter core. The robustness to Gaussian filtering is the strongest when
σ
is 0.4
and more than 95 % of the image blocks can be authenticated. The robustness of Gaussian filtering decreases with the
σ
increase. In addition
multi-sets of threshold experiments have been conducted to analyze the impact of the algorithm' s threshold setting in the context of the robustness of smoothing filtering. The results demonstrate that the larger the threshold is
the stronger the robustness generated. The algorithm is still sensitive to severe tampering while the threshold increases.
Conclusion
2
Tampering and filtering of different scene images is evolved. The illustration of the tolerable modification threshold is sorted out watermarking. It demonstrates that the algorithm can realize the authentication and recovery of the tampering of the local area of the image. Qualified robustness is obtained via regularized processing
such as mean
median and Gaussian filtering. As a result
the comparison with the current methods verifies the advantages of the algorithm in image quality in accordance with watermarking and restoration of image quality.
半脆弱水印自嵌入块截断编码篡改认证篡改恢复
semi-fragile watermarkingself-embeddingblock truncation codingtampering authenticationtampering recover
Al-Otum H A M and Alansari A W. 2019. Image watermarking for tamper detection and content recovery applications based on a preservative Bi-level moment approach with shuffling//Proceedings of the 5th International Conference on Computer and Technology Applications. Istanbul, Turkey: ACM: 25-29 [DOI: 10.1145/3323933.3324078http://dx.doi.org/10.1145/3323933.3324078]
Ansari I A, Pant M and Ahn C W. 2016. SVD based fragile watermarking scheme for tamper localization and self-recovery. International Journal of Machine Learning and Cybernetics, 7(6): 1225-1239 [DOI: 10.1007/s13042-015-0455-1]
Chang C C, Lin C C and Su G D. 2020. An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC. Multimedia Tools and Applications, 79(33): 24795-24824 [DOI: 10.1007/s11042-020-09132-w]
Chen F, He H J and Huo Y R. 2017. Self-embedding watermarking scheme against JPEG compression with superior imperceptibility. Multimedia Tools and Applications, 76(7): 9681-9712 [DOI: 10.1007/s11042-016-3574-0]
Delp E and Mitchell O. 1979. Image compression using block truncation coding. IEEE Transactions on Communications, 27(9): 1335-1342 [DOI: 10.1109/TCOM.1979.1094560]
Egorova A and Fedoseev V. 2020. An ROI-based watermarking technique for image content recovery robust against JPEG//Proceedings of 2020 International Conference on Information Technology and Nanotechnology. Samara, Russia: IEEE: 1-6 [DOI: 10.1109/ITNT49337.2020.9253189http://dx.doi.org/10.1109/ITNT49337.2020.9253189]
Enugula S, Srujana V, Nasani K, Shruthi G and Vikram V. 2020. Image security using self embedding fragile watermarking method. International Research Journal on Advanced Science Hub, 2(6): 65-71 [DOI: 10.47392/irjash.2020.38]
Gul E and Ozturk S. 2020. A novel triple recovery information embedding approach for self-embedded digital image watermarking. Multimedia Tools and Applications, 79(41): 31239-31264 [DOI: 10.1007/s11042-020-09548-4]
Hemida O and He H J. 2020. A self-recovery watermarking scheme based on block truncation coding and quantum chaos map. Multimedia Tools and Applications, 79(25): 18695-18725 [DOI: 10.1007/s11042-020-08727-7]
Kim C and Yang C N. 2021. Self-embedding fragile watermarking scheme to detect image tampering using AMBTC and OPAP approaches. Applied Sciences, 11(3): #1146 [DOI: 10.3390/app11031146]
Li C L, Zhang A H, Liu Z F, Liao L and Huang D. 2015. Semi-fragile self-recoverable watermarking algorithm based on wavelet group quantization and double authentication. Multimedia Tools and Applications, 74(23): 10581-10604 [DOI: 10.1007/s11042-014-2188-7]
Lin P L, Hsieh C K and Huang P W. 2005. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition, 38(12): 2519-2529 [DOI: 10.1016/j.patcog.2005.02.007]
Qian Z X, Feng G R, Zhang X P and Wang S Z. 2011. Image self-embedding with high-quality restoration capability. Digital Signal Processing, 21(2): 278-286 [DOI: 10.1016/j.dsp.2010.04.006]
Rakhmawati L, Wirawan and Suwadi. 2018. Image fragile watermarking with two authentication components for tamper detection and recovery//Proceedings of 2018 International Conference on Intelligent Autonomous Systems. Singapore, Singapore: IEEE: 35-38 [DOI: 10.1109/ICoIAS.2018.8494080http://dx.doi.org/10.1109/ICoIAS.2018.8494080]
Rhayma H, Makhloufi A, Hamam H and Hamida A B. 2019. Semi-fragile self-recovery watermarking scheme based on data representation through combination. Multimedia Tools and Applications, 78(10): 14067-14089 [DOI: 10.1007/s11042-019-7244-x]
Singh D and Singh S K. 2016. Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability. Journal of Visual Communication and Image Representation, 38: 775-789 [DOI: 10.1016/j.jvcir.2016.04.023]
Singh D and Singh S K. 2019. Block truncation coding based effective watermarking scheme for image authentication with recovery capability. Multimedia Tools and Applications, 78(4): 4197-4215 [DOI: 10.1007/s11042-017-5454-7]
Tong X J, Liu Y, Zhang M and Chen Y. 2013. A novel chaos-based fragile watermarking for image tampering detection and self-recovery. Signal Processing: Image Communication, 28(3): 301-308 [DOI: 10.1016/j.image.2012.12.003]
Yang S S, Qin C and Xu B Q. 2015. Fragile watermarking based on secure embedding for hierarchical tampering detection and content recovery. Application Research of Computers, 32(2): 507-511
杨杉杉, 秦川, 徐伯庆. 2015. 一种基于安全隐藏的图像分层窜改检测和内容恢复算法. 计算机应用研究, 32(2): 507-511 [DOI: 10.3969/j.issn.1001-3695.2015.02.041]
Zhang X P, Qian Z X, Ren Y L and Feng G R. 2011a. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction. IEEE Transactions on Information Forensics and Security, 6(4): 1223-1232 [DOI: 10.1109/TIFS.2011.2159208]
Zhang X P and Wang S Z. 2009. Fragile watermarking scheme using a hierarchical mechanism. Signal Processing, 89(4): 675-679 [DOI: 10.1016/j.sigpro.2008.10.001]
Zhang X P, Wang S Z, Qian Z X and Feng G R. 2011b. Self-embedding watermark with flexible restoration quality. Multimedia Tools and Applications, 54(2): 385-395 [DOI: 10.1007/s11042-010-0541-z]
Zhao X H and Zhang X P. 2013. Recoverable combining DCT and VQ encoding fragile watermarking algorithm. Science Technology and Engineering, 13(17): 5004-5009
赵新辉, 张晓培. 2013. 结合DCT和VQ编码的可恢复脆弱水印算法. 科学技术与工程, 13(11): 5004-5009 [DOI: 10.3969/j.issn.1671-1815.2013.17.047]
相关作者
相关机构