Download presentation
Presentation is loading. Please wait.
Published byDorothy Miller Modified over 9 years ago
1
Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp. 331-343 Authors: Chun-Wei Yang and Jau-Ji Shen Reporter: Te-Yu Chen( 陳德祐 )
2
Outline Introduction The Proposed Scheme VQ Index Embedding and Watermark Embedding Wong et al.’s Watermarking Schemes for Authentication and Ownership Verification Watermark Extraction and Image recovery Experimental Results Conclusions & Comments 2
3
Watermarking Data Image Authentication with Tamper Detection and Recovery Public channel Embedding Yes OK No Original image Watermarked image Received image Recovered image Tamper recovery 3
4
WatermarkingWorking DomainSpatialFrequencyRobustnessRobustSemi-FragileFragilePerceptionVisibleInvisible Necessary Data for Extraction Blind (Public) Semi-Blind (Semi- Public) Non-Blind (Private) 4
5
Requirements Ability of tamper detection Ability of tamper recovery Image quality Resistant to known attacks Tamper watermarked image without being detected Counterfeit attack Collage attack VQ attack Blind attack Cropping Trace out the mapping correlation of blocks The four-scanning attack(brute-force/dictionary attack) 5
6
Literature 1.A Hierarchical Digital Watermarking Method for Image Tamper Detection and RecoveryA Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang, Pattern Recognition, Vol. 38, Issue 11, 2005 2.A Majority-voting Based Watermarking Scheme for Color Image Tamper Detection and RecoveryA Majority-voting Based Watermarking Scheme for Color Image Tamper Detection and Recovery Ming-Shi Wang and Wei-Che Chen, Computer Standards & Interfaces, 29, pp.561- 570, 2007 3.Dual Watermark for Tamper Detection and RecoveryDual Watermark for Tamper Detection and Recovery Tien-You Lee and Shinfeng D. Lin, Pattern Recognition, 41(11), pp.3497-3506, 2008 4.Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recoveryFour-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery Chin-Chen Chang,Yi-Hsuan Fan, and Wei-Liang Tai, Pattern Recognition, Vol. 41, Issue 2, Feb. 2008, pp. 654-661 5.Watermarking for tamper detection and recovery Youngran Park, Hyunho Kang, Kazuhiko Yamahuchi, and Kingo Kobayashi, IEICE Electronics Express, 5(17), pp. 689-696, 2008 6.Recover the tampered image based on VQ indexing Chun-Wei Yang and Jau-Ji Shen, Signal Processing, 90(1), 2010, pp. 331-343 6
7
Comparisons 7
8
Watermarking 1n32 1 n 32 8
9
The Proposed Scheme~ Embedding 9 Recovery Information Recovery Information Verification Information Verification Information
10
Recovery information ~VQ Encoding Index Table Original Image Codebook 0 1 2 3 4 5 6 ‧ 168 ‧ 255 (150,135,…,128) … (20,65,…,110) (90,135,…,120) (120,155,…,80) (50,42,…,98) (49,117,…,25) (100,125,…,150) … 10 168120112503658123........................................................
11
11 10 168120112503658123........................................................
12
Verification information ~ Wong’s watermarking scheme(Embedding) 12
13
13051 12180 Image block H r = H(256, 256, 1016, 1, 130, 50, 120, 80) = 11010110… F r = H r ⊕ Br = 1101 ⊕ 0100 = 1001 P r = E k’ (F r ) = E k’ (1001) = 0011 Watermarked block Wong’s watermarking scheme~ Embedding 13 NCHU 1305050 1218181 Original Image M o : the image width (256) N o : the image height (256) I o : the image ID (1015) r: the block index (1) the r-th image block after setting LSB1 to 0 (130, 50, 120, 80) Watermarked Image
14
The Proposed Scheme~ Tamper detection and recovery 14 Detection Recovery
15
Wong’s watermarking scheme~ Detection 15
16
16 10
17
Recovery information ~VQ Recovery Recovered Image Codebook 0 1 2 3 4 5 6 ‧ 168 ‧ 255 (150,135,…,128) … (20,65,…,110) (90,135,…,120) (120,155,…,80) (50,42,…,98) (49,117,…,25) (100,125,…,150) … 17
18
Original Tampered (56% cropped) Lee and Lin’s scheme PSNR=26.75dB The proposed scheme PSNR=29.33dB Experimental Results Image size: 256×256 pixels CB size: 256 code words Code word:4×4 pixels IT can be embedded into O four times 18 CB size: 256×4×4×256 bits
19
Tampered Recovered Tampered Recovered PSNR=31.70dB31.72dB30.91dB31.69dB PSNR=31.28dB31.99dB30.33dB31.72dB 19
20
35.24 dB 36.53 dB 31.11 dB Tamped Image Tamper detected images The recovered images 20
21
49%61%65%70% 75%80%85%90% 29.83dB 29.16dB 28.62dB 27.66dB 26.30dB 24.41dB 22.59dB 20.12dB 21
22
Conclusions An image tamper detection and recovery scheme integrating Wong’s watermarking scheme and VQ is proposed. The number of times of embedding the recovery info. into the image is adjustable. The quality of the recovered image is high. Resistant against the known attacks. (Wong et al.’s scheme is adopted) 22
23
Comments Owing to the use of a public key cryptographic system, the block size should be large enough for the security concern(1024bits). However, the larger the block size is, the less precision of error detection will be. Owing to the use of a public key cryptographic system, the computational cost is high. Additional cost: code book(4×4 ×256×256 bits) 23
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.