Presentation is loading. Please wait.

Presentation is loading. Please wait.

Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp. 331-343 Authors: Chun-Wei Yang and Jau-Ji.

Similar presentations


Presentation on theme: "Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp. 331-343 Authors: Chun-Wei Yang and Jau-Ji."— Presentation transcript:

1 Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp. 331-343 Authors: Chun-Wei Yang and Jau-Ji Shen Reporter: Te-Yu Chen( 陳德祐 )

2 Outline Introduction The Proposed Scheme  VQ Index Embedding and Watermark Embedding  Wong et al.’s Watermarking Schemes for Authentication and Ownership Verification  Watermark Extraction and Image recovery Experimental Results Conclusions & Comments 2

3 Watermarking Data Image Authentication with Tamper Detection and Recovery Public channel Embedding Yes OK No Original image Watermarked image Received image Recovered image Tamper recovery 3

4 WatermarkingWorking DomainSpatialFrequencyRobustnessRobustSemi-FragileFragilePerceptionVisibleInvisible Necessary Data for Extraction Blind (Public) Semi-Blind (Semi- Public) Non-Blind (Private) 4

5 Requirements Ability of tamper detection Ability of tamper recovery Image quality Resistant to known attacks  Tamper watermarked image without being detected Counterfeit attack  Collage attack  VQ attack Blind attack Cropping  Trace out the mapping correlation of blocks The four-scanning attack(brute-force/dictionary attack) 5

6 Literature 1.A Hierarchical Digital Watermarking Method for Image Tamper Detection and RecoveryA Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery  Phen-Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang, Pattern Recognition, Vol. 38, Issue 11, 2005 2.A Majority-voting Based Watermarking Scheme for Color Image Tamper Detection and RecoveryA Majority-voting Based Watermarking Scheme for Color Image Tamper Detection and Recovery  Ming-Shi Wang and Wei-Che Chen, Computer Standards & Interfaces, 29, pp.561- 570, 2007 3.Dual Watermark for Tamper Detection and RecoveryDual Watermark for Tamper Detection and Recovery  Tien-You Lee and Shinfeng D. Lin, Pattern Recognition, 41(11), pp.3497-3506, 2008 4.Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recoveryFour-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery  Chin-Chen Chang,Yi-Hsuan Fan, and Wei-Liang Tai, Pattern Recognition, Vol. 41, Issue 2, Feb. 2008, pp. 654-661 5.Watermarking for tamper detection and recovery  Youngran Park, Hyunho Kang, Kazuhiko Yamahuchi, and Kingo Kobayashi, IEICE Electronics Express, 5(17), pp. 689-696, 2008 6.Recover the tampered image based on VQ indexing  Chun-Wei Yang and Jau-Ji Shen, Signal Processing, 90(1), 2010, pp. 331-343 6

7 Comparisons 7

8 Watermarking 1n32 1 n 32 8

9 The Proposed Scheme~ Embedding 9 Recovery Information Recovery Information Verification Information Verification Information

10 Recovery information ~VQ Encoding Index Table Original Image Codebook 0 1 2 3 4 5 6 ‧ 168 ‧ 255 (150,135,…,128) … (20,65,…,110) (90,135,…,120) (120,155,…,80) (50,42,…,98) (49,117,…,25) (100,125,…,150) … 10 168120112503658123........................................................

11 11 10 168120112503658123........................................................

12 Verification information ~ Wong’s watermarking scheme(Embedding) 12

13 13051 12180 Image block H r = H(256, 256, 1016, 1, 130, 50, 120, 80) = 11010110… F r = H r ⊕ Br = 1101 ⊕ 0100 = 1001 P r = E k’ (F r ) = E k’ (1001) = 0011 Watermarked block Wong’s watermarking scheme~ Embedding 13 NCHU 1305050 1218181 Original Image M o : the image width (256) N o : the image height (256) I o : the image ID (1015) r: the block index (1) the r-th image block after setting LSB1 to 0 (130, 50, 120, 80) Watermarked Image

14 The Proposed Scheme~ Tamper detection and recovery 14 Detection Recovery

15 Wong’s watermarking scheme~ Detection 15

16 16 10

17 Recovery information ~VQ Recovery Recovered Image Codebook 0 1 2 3 4 5 6 ‧ 168 ‧ 255 (150,135,…,128) … (20,65,…,110) (90,135,…,120) (120,155,…,80) (50,42,…,98) (49,117,…,25) (100,125,…,150) … 17

18 Original Tampered (56% cropped) Lee and Lin’s scheme PSNR=26.75dB The proposed scheme PSNR=29.33dB Experimental Results Image size: 256×256 pixels CB size: 256 code words Code word:4×4 pixels IT can be embedded into O four times 18 CB size: 256×4×4×256 bits

19 Tampered Recovered Tampered Recovered PSNR=31.70dB31.72dB30.91dB31.69dB PSNR=31.28dB31.99dB30.33dB31.72dB 19

20 35.24 dB 36.53 dB 31.11 dB Tamped Image Tamper detected images The recovered images 20

21 49%61%65%70% 75%80%85%90% 29.83dB 29.16dB 28.62dB 27.66dB 26.30dB 24.41dB 22.59dB 20.12dB 21

22 Conclusions An image tamper detection and recovery scheme integrating Wong’s watermarking scheme and VQ is proposed. The number of times of embedding the recovery info. into the image is adjustable. The quality of the recovered image is high. Resistant against the known attacks. (Wong et al.’s scheme is adopted) 22

23 Comments Owing to the use of a public key cryptographic system, the block size should be large enough for the security concern(1024bits). However, the larger the block size is, the less precision of error detection will be. Owing to the use of a public key cryptographic system, the computational cost is high. Additional cost: code book(4×4 ×256×256 bits) 23


Download ppt "Recover the tampered image based on VQ indexing Source: Signal Processing, Volume 90, Issue 1, Jan. 2010, pp. 331-343 Authors: Chun-Wei Yang and Jau-Ji."

Similar presentations


Ads by Google