Download presentation
Presentation is loading. Please wait.
Published byMary Udall Modified over 9 years ago
1
1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University, Chengdu, Sichuan, P.R. China
2
2 Fan Chen Chengdu, Sichuan, China Southwest Jiaotong University An associate professor, and pursuing the Ph.D degree Research interests: digital watermarking and Digital-forensics.
3
3 Presentation Outline 1.Background 2.Proposed Self-recovery Scheme 3.Experimental Results 4.Conclusions and Future Work Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload
4
4 1. Background Image Blocks Block codes : 8×8 pixels: DCT coefficients 2×2 pixels : average intensity Common Characteristic The length of block codes is fixed.
5
5 5 1. Background SIP laboratory Examples: Smooth Rough Blocks DCT quantized coefficients [9]. Z.Qian et al, Image self-embedding with high-quaility restoration capability, Digital Signal Processing, 21 (2011): 278-286.
6
6 6 1. Background SIP laboratory Qian [9] proposed that the blocks were encoded to different number of bits. The rougher blocks have more bits And the smoother blocks have fewer bits. But, the amount of the compression code bits was still fixed for different images, no matter the image is smooth or rough. [9]. Z.Qian et al, Image self-embedding with high-quaility restoration capability, Digital Signal Processing, 21 (2011): 278-286.
7
7 The watermark payload is more than the average length of the codes. This is due to the following two facts: Tampering coincidence problem: Dual watermark [7], Reference Sharing Mechanism [2] Tamper detection problem: Authentication data Increasing watermark payload Decreasing the quality of watermarked image Being vulnerable to the collage attack 1. Background
8
8 2 The Proposed Scheme Main purpose Reducing the watermark payload as much as possible while maintaining good recovery quality and security Strategies Variable watermark payload
9
9 Watermarked Image Generation Variable-Length Block Coding Variable-Payload Watermark embedding Tamper Detection and Recovery Tamper detection Tamper recovery 2 The Proposed Scheme
10
10 Variable-Length Block Coding For a block of 8×8 pixels: The basic-code: 24 bit The total-code : the number of bits is variable 2 The Proposed Scheme -----watermarked Image Generation Type sType-code Code length v i (bits) 100127 201043 301158 410070 510185 6110101 Code length: (24+27,24+101)
11
11 Variable-Payload Watermark Insertion 1.Watermark payload equals to the length of block-codes. 2.Basic-code and total-code of a block are encrypted and hidden in the different blocks based on secret key. 2 The Proposed Scheme -----watermarked Image Generation
12
12 2 The Proposed Scheme -----Watermarked Image Generation Basic-code Total-code Basic-code: the second LSB of the last 24 pixels Total-code
13
13 SIP laboratory Tamper Detection: Statistical Detection [5] (1) Basic-code mapping: T B (2) Total-code mapping : T T (3) Incorporation : T 2 The Proposed Scheme -----Watermarked Image Generation
14
14 SIP laboratory Basic-code matching Total-code matching Detection results T Tamper detection performance is better [5] He ea al, Adjacent-Block Based Statistical Detection Method for Self- Embedding Watermarking Techniques, 2009 2 The Proposed Scheme -----Watermarked Image Generation
15
15 Tamper Recovery : Only for the invalid blocks. Watermark-reserved: the tampered block whose basic-code or total-code is valid the corresponding codes Watermark-destroyed: the tampered block whose basic-code and total-code are destroyed the valid blocks adjacent to the block 2 The Proposed Scheme ----- Tamper Detection and Recovery
16
16 3. Experimental results Images Watermark Payload (bpp) Proposed Qian[9] Invisibility (dB) Proposed Qian [9] Boat1.35346.4937.92 Lena1.46346.1637.94 Airplane1.47346.0237.93 Barbara1.63345.4137.87 Mona Lisa1.63345.7037.97 Elaine1.64345.5237.94 Goldhill1.73345.1237.93 Napoleon1.74345.0637.96 Man1.77345.0237.93 Fingerprint1.95344.3637.79 The watermark payload and invisibility for different images
17
17 Restoration Performance The tampered image can be recovered by the proposed scheme with an acceptable visual quality even the tamper ratio is up to 60% of the host image. 3. Experimental results
18
18 (a) Watermarked Napoleon (b) Watermarked Mona Lisa Collage attack 3. Experimental results both of size 372×288
19
19 (c) Tampered image (about 20%) Collage attack (d) Proposed 35.27 dB 3. Experimental results
20
20 multi-region and multi-attack tampering (1) General tampering (2) Only content tampering (3) Collage attack (4) Constant-feature attack 3. Experimental results
21
21 (a) Proposed 34.38dB (b) Qian [9] 16.58 dB (c) He [5] 23.89 dB 3. Experimental results Qian [9] and He [5] cannot resist all the counterfeiting attacks
22
22 Our work A variable watermark payload Invisibility Recovery quality Security 4. Conclusions and Future Work
23
23 4. Conclusions and Future Work Future work Extending this approach to resist mild distortion such as JPEG compression And analytic investigation on the tamper detection performance.
24
24 If you have any question, please e-mail us. Email: Fchen@swjtu.cnFchen@swjtu.cn hehojie@126.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.