×

Automatic image authentication and recovery using fractal code embedding and image inpainting. (English) Zbl 1129.68494

Summary: We propose a novel scheme of automatic image authentication and recovery, in which the altered region of the image can be detected and recovered in a fully automated fashion. To achieve high-quality image recovery, we choose the Region Of Importance (ROI) in the image and perform fractal encoding for the blocks of ROI. And then we insert the fractal codes of ROI and the watermark into the original image to obtain the watermarked image. By watermark extraction, we can determine whether the watermarked image has been tampered or not. If the watermarked image has been tampered, we can automatically localize the altered region, and apply either fractal decoding or image inpainting for image recovery. Finally, experimental results are given to show the effectiveness of the proposed scheme.

MSC:

68T10 Pattern recognition, speech recognition
68P25 Data encryption (aspects in computer science)
68U10 Computing methodologies for image processing
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Barreto, P. S.L. M.; Kim, H. Y.; Rijmen, V., Toward secure public-key blockwise fragile authentication watermarking, IEEE Proc. Vision Image Signal Process., 149, 2, 57-62 (2002)
[2] Fridrich, J.; Goljan, M.; Baldoza, A. C., New fragile authentication watermark for images, (International Conference on Image Processing, vol. 1 (2000)), 446-449
[3] Lu, H.; Shen, R.; Chung, F. L., Fragile watermarking scheme for image authentication, Electron. Lett., 39, 12, 898-900 (2003)
[4] P.W. Wong, A public key watermark for image verification and authentication, in: Proceedings of the IEEE International Conference on Image Processing, vol. 1, Chicago, USA, October 1998, pp. 445-459.; P.W. Wong, A public key watermark for image verification and authentication, in: Proceedings of the IEEE International Conference on Image Processing, vol. 1, Chicago, USA, October 1998, pp. 445-459.
[5] P.W. Wong, A watermark for image integrity and ownership verification, Proceedings of the IS&T PIC Conference (Portland OR), May 1998 (also available as Hewlett-Packard Labs. Technical Report HPL-97-72, May 1997).; P.W. Wong, A watermark for image integrity and ownership verification, Proceedings of the IS&T PIC Conference (Portland OR), May 1998 (also available as Hewlett-Packard Labs. Technical Report HPL-97-72, May 1997).
[6] Yeung, M. M.; Mintzer, F., An invisible watermarking technique for image verification, (International Conference on Image Processing, vol. 1 (1997)), 680-683
[7] Wong, P. W.; Memon, N., Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Process., 10, 10, 1593-1601 (2001) · Zbl 1039.68802
[8] Celik, M. U.; Sharma, G.; Saber, E.; Tekalp, A. M., Hierarchical watermarking for secure image authentication with localization, IEEE Trans. Image Process., 11, 6, 585-595 (2002)
[9] Wu, J.; Zhu, B. B.; Li, S.; Lin, F., A secure image authentication algorithm with pixel-level tamper localization, (International Conference on Image Processing (2004)), 1573-1576
[10] Lin, P. L.; Hsieh, C.; Huang, P., A hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition, 38, 2519-2529 (2005)
[11] Fridrich, J.; Goljan, M., Images with self-correcting capabilities, (International Conference on Image Processing, vol. 3 (1999)), 792-796
[12] Lin, P. L.; Huang, P. W.; Peng, A. W., A fragile watermarking for image authentication with localization and recovery, (International Symposium on Multimedia Software Engineering (2004)), 146-153
[13] Ashikhmin, M., Synthesizing natural textures, (Proceedings of the ACM Symposium on Interactive 3D Graphics (March 2001)), 217-226
[14] Efros, A.; Freeman, W. T., Image quilting for texture synthesis and transfer, (Proceedings of the ACM Conference on Computer Graphics (SIGGRAPH) (August 2001)), 341-346
[15] Criminisi, A.; Perez, P.; Toyama, K., Region filling and object removal by exemplar-based image inpainting, IEEE Trans. Image Process., 13, 9, 1200-1212 (2004)
[16] Barnsley, M. F., Fractal Everywhere (1988), Academic Press, Inc.: Academic Press, Inc. San Diego
[17] Jacquin, A. E., Fractal image coding: a review, Proc. IEEE, 81, 10, 1451-1465 (1993)
[18] Jacquin, A. E., Image coding based on a fractal theory of iterated contractive image transformations, IEEE Trans. Image Process., 1, 1, 18-30 (1992)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.