Research Article
Semi-fragile Watermarking Algorithm Based on Arnold Scrambling for Three-Layer Tamper Localization and Restoration
@INPROCEEDINGS{10.1007/978-3-319-78078-8_8, author={Bin Feng and Xiangli Li and Yingmo Jie and Cheng Guo and Huijuan Fu}, title={Semi-fragile Watermarking Algorithm Based on Arnold Scrambling for Three-Layer Tamper Localization and Restoration}, proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Systems. 13th International Conference, QShine 2017, Dalian, China, December 16 -17, 2017, Proceedings}, proceedings_a={QSHINE}, year={2018}, month={4}, keywords={Semi-fragile watermark Arnold scrambling Hierarchical tamper localization Tamper recovery Torus self-isomorphism mapping}, doi={10.1007/978-3-319-78078-8_8} }
- Bin Feng
Xiangli Li
Yingmo Jie
Cheng Guo
Huijuan Fu
Year: 2018
Semi-fragile Watermarking Algorithm Based on Arnold Scrambling for Three-Layer Tamper Localization and Restoration
QSHINE
Springer
DOI: 10.1007/978-3-319-78078-8_8
Abstract
To protect the content integrity, authenticity and improve the effect of tamper localization and recovery, this paper designs and implements a semi-fragile watermark based on Arnold transformation, which is used to localize and recover tamper of confused image and plain-image. The sender encodes the watermark into the 2-bit least significant bit of the pixel of the original image, and the authentication watermark consists of the pixel value comparison result and the parity check code; the recovery watermark is the pixel value of the Torus image block. In the detection side, the plain-image adopts the stratified idea, carries on the three-level tamper localization and recovery, the third-party authentication institution can detect tamper of the scrambled image using the layer detection method, the receiver will detect the positioning result again. The experimental results show that the proposed algorithm can accurately locate tamper and realize the content recovery and effectively prevent the vector quantization attack. Compared with other algorithms, this algorithm has better effect of tamper localization and recovery.