A new fragile watermarking approach for tamper detection and recovery of document images

R. ChetanK., S. Nirmala
{"title":"A new fragile watermarking approach for tamper detection and recovery of document images","authors":"R. ChetanK., S. Nirmala","doi":"10.1109/ICACCI.2014.6968624","DOIUrl":null,"url":null,"abstract":"In this paper, a fragile watermarking scheme is proposed for tamper detection and recovery of digital images. In this scheme, the source document image is divided into blocks of uniform size and a pseudo-random mapping of blocks is generated. For each block, a watermark consisting of authentication and recovery information is generated and embedded into the corresponding mapping block. The authentication data is formed using the Least Significant Bit (LSB) of each pixel value in the block. The recovery information consists of sub-sampled versions of two moment-preserving thresholds of the block. At the receiver side, the watermark is extracted from the corresponding mapping blocks for each block of the watermarked document image. A dual-option parity check method is applied on the authentication data in the extracted watermark to check whether the watermarked image block is tampered or not. If the image block is found to be tampered, the recovery information is extracted from the watermark. From the experimental results it is found that the average value of tamper detection rate and recovery rate for various types of intentional attacks on the document images corpus is 93.8% and 93.6% respectively. Further, the average Peak Signal to Noise Ratio (PSNR) of the recovered images is 61.24%. The comparative analysis reveals that the proposed scheme outperforms the existing system [16]. Keywords— Fragile Watermarking; thresholding; Tamper detection; Tamper recovery;","PeriodicalId":290400,"journal":{"name":"International Conference on Advances in Computing, Communications and Informatics","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Advances in Computing, Communications and Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCI.2014.6968624","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

In this paper, a fragile watermarking scheme is proposed for tamper detection and recovery of digital images. In this scheme, the source document image is divided into blocks of uniform size and a pseudo-random mapping of blocks is generated. For each block, a watermark consisting of authentication and recovery information is generated and embedded into the corresponding mapping block. The authentication data is formed using the Least Significant Bit (LSB) of each pixel value in the block. The recovery information consists of sub-sampled versions of two moment-preserving thresholds of the block. At the receiver side, the watermark is extracted from the corresponding mapping blocks for each block of the watermarked document image. A dual-option parity check method is applied on the authentication data in the extracted watermark to check whether the watermarked image block is tampered or not. If the image block is found to be tampered, the recovery information is extracted from the watermark. From the experimental results it is found that the average value of tamper detection rate and recovery rate for various types of intentional attacks on the document images corpus is 93.8% and 93.6% respectively. Further, the average Peak Signal to Noise Ratio (PSNR) of the recovered images is 61.24%. The comparative analysis reveals that the proposed scheme outperforms the existing system [16]. Keywords— Fragile Watermarking; thresholding; Tamper detection; Tamper recovery;
一种用于文档图像篡改检测和恢复的脆弱水印新方法
本文提出了一种用于数字图像篡改检测和恢复的脆弱水印方案。在该方案中,将源文档图像划分为大小一致的块,并生成块的伪随机映射。对于每个块,生成一个由认证信息和恢复信息组成的水印,并嵌入到对应的映射块中。认证数据使用块中每个像素值的最低有效位(LSB)形成。恢复信息由块的两个矩保持阈值的子采样版本组成。在接收端,从被加水印的文档图像的每个块对应的映射块中提取水印。对提取的水印中的认证数据采用双选项奇偶校验方法,检测水印图像块是否被篡改。如果发现图像块被篡改,则从水印中提取恢复信息。实验结果表明,不同类型的故意攻击对文档图像语料库的篡改检测率和恢复率的平均值分别为93.8%和93.6%。恢复图像的平均峰值信噪比(PSNR)为61.24%。对比分析表明,本文提出的方案优于现有系统[16]。关键词:脆弱水印;阈值;篡改检测;损害复苏;
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信