11

Click here to load reader

Watermarking

Embed Size (px)

DESCRIPTION

Image Tampering detection and Recovery

Citation preview

Page 1: Watermarking

Pattern Recognition 38 (2005) 2519–2529www.elsevier.com/locate/patcog

A hierarchical digital watermarking method for image tamperdetection and recovery�

Phen Lan Lina,∗, Chung-Kai Hsiehb, Po-Whei HuangbaDepartment of Computer Science and Information Engineering, Providence University, Shalu, Taichung 433, Taiwan

bDepartment of Computer Science, National Chung Hsing University, Taichung, Taiwan

Received 2 December 2003; received in revised form 21 February 2005; accepted 21 February 2005

Abstract

In this paper, we present an efficient and effective digital watermarking method for image tamper detection and recovery.Our method is efficient as it only uses simple operations such as parity check and comparison between average intensities.It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can beensured. That is, if a tampered block is not detected in level-1 inspection, it will be detected in level-2 or level-3 inspectionwith a probability of nearly 1. Our method is also very storage effective, as it only requires a secret key and a public chaoticmixing algorithm to recover a tampered image. The experimental results demonstrate that the precision of tamper detectionand localization is 99.6% and 100% after level-2 and level-3 inspection, respectively. The tamper recovery rate is better than93% for a less than half tampered image. As compared with the method in Celik et al. [IEEE Trans. Image Process. 11(6)(2002) 585], our method is not only as simple and as effective in tamper detection and localization, it also provides with thecapability of tamper recovery by trading off the quality of the watermarked images about 5 dB.� 2005 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.

Keywords:Image authentication; Tamper detection; Tamper localization; Digital watermarking

1. Introduction

Since the past decade, there has been a rapid growth inusing digital multimedia data. The flourish of PC with thewideband Internet connections has made the distribution ofmultimedia data much easier and faster. On the other hand,the wide availability of powerful image processing tools hasalso made imperceptible image modifications possible. Asa result, image authenticity becomes greatly threatened.

Classical image authentication mechanisms[1–4], some-times called tamper-proofing mechanisms, attach a signature

� This research is supported by National Science Council ofROC under Grant NSC-92-2213-E-126-009.

∗ Corresponding author. Tel.: +886-4-632-8001x3409;fax: +886-4-632-4045.

E-mail address:[email protected](P.L. Lin).

0031-3203/$30.00� 2005 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.doi:10.1016/j.patcog.2005.02.007

to the image and verify the received image by comparingits signature to the signature attached to it. The signaturecan be either an encrypted or a signed hash value of imagecontents or image characteristics (e.g., edges, histograms,moments, etc.)[5]. These mechanisms can detect if an imagehas been changed; however, they cannot locate where theimage was changed. Besides, the attached signature requiresadditional bandwidth or storage that may not always beavailable. To solve these problems, many researchers haveproposed watermarking for image authentication[6–17].

Based on the functionality, Vleeschouwer et al.[18] clas-sified the image authentication watermarking techniquesinto three categories: (1) fragile watermarking, which detectsany modification to the image[7,11–13,19]; (2) semi-fragilewatermarking, which detects and localizes the modificationsto the contents[6–8]; (3) content-based fragile watermark-ing, which detects only the significant changes in the image

Page 2: Watermarking

2520 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519–2529

while permitting content-preserving processing such as cod-ing and scanning[2,10]. In Ref. [20], the above categories(1) and (2) are combined as fragile watermarking, whereascategory (3) is named as semi-fragile watermarking. Someexamples of these schemes are presented in Refs.[21–24].In this paper, we adopt the definitions of fragile and semi-fragile watermarking presented in Ref.[20].

Wong [12] proposed a public-key fragile watermark-ing scheme that embeds a digital signature of each blockwithin the image into the least significant bits of the sameblock. However, Holliman and Memon[25] soon presenteda vector quantization (VQ) counterfeiting attack that canconstruct a counterfeit image from a VQ codebook gen-erated from a set of watermarked images. To solve theproblem of VQ counterfeiting attack, several enhancedalgorithms were proposed[7,25,27]. Nonetheless, theyeither fail to effectively address the problem or sacrificetamper localization accuracy of the original methods[20].Celik et al. then presented an algorithm based on Wong’sscheme and demonstrated that their algorithm can thwartthe VQ codebook attack while sustaining the localizationproperty[20].

In this paper, we present an efficient and effective dig-ital watermarking method for image tamper detection andrecovery. Our method is efficient as it only uses simple op-erations such as parity check and comparison between av-erage intensities. It is effective because the scheme inspectsthe image hierarchically with the inspection view increasesalong with the hierarchy so that the accuracy of tamper lo-calization can be ensured. That is, if a tampered block is notdetected in level-1 inspection, it will be detected in level-2 or level-3 inspection with a probability of nearly 1. Ourmethod is also very storage effective, as it only requires a se-cret key and a public chaotic mixing algorithm to recover thetampered areas. The experimental results demonstrate thatthe precision of tamper detection and localization is close to100% after level-2 inspection and the tamper recovery rateis better than 93% for a less than half tampered image. Ascompared with the method in Ref.[20], our method is notonly as simple and as effective in tamper detection and lo-calization, it also provides with the capability of tamper re-covery by trading off the quality of the watermarked imagesabout 5 dB.

The remainder of this paper is organized as follows. InSection 2, we briefly describe VQ counterfeiting attacks andTorus automorphism. Our proposed watermarking scheme ispresented in Section 3. In Sections 4 and 5, we demonstratethe experimental results and analyze the performance ofour scheme. Finally, the concluding remarks are given inSection 6.

2. Backgrounds

In this section, we briefly describe both vector quantiza-tion (VQ) counterfeiting attacks and Torus automorphism.

2.1. VQ counterfeiting attacks

Holliman and Memon[25] presented a counterfeiting at-tack on block-wise independent watermarking schemes. Insuch an attack, the attacker is able to create a counterfeit im-age by using a collage of watermarked blocks selected froma large database. Because block-wise independent schemesvalidate the watermark of each individual block and the wa-termark of each block comprises only the information of theblock itself, the counterfeit image generated from the VQcodebook can easily pass the authentication test of block-wise independent schemes.

2.2. Torus automorphism

Torus automorphism is a kind of dynamic system. Brieflyspeaking, a dynamic system is a system whose states changewith time t. When t is discrete, a dynamic system can bepresented as an iteration of a functionf, i.e.,St+1 = f (St ),t ∈ Z = {0,1,2, . . .}, St , St+1 are the states at timet andt + 1, respectively. A two-dimensional Torus automorphismcan be considered as a permutation function or a spatialtransformation of a plane region. This transformation can beperformed using a 2× 2 matrix A with constant elements.More specifically, a stateSt+1 or a point(xi+1, yi+1) can betransformed from another stateSt or another point(xi , yi)by

A =(a1 a2a3 a4

),

(xi+1yi+1

)= A ×

(xiyi

)modN , (1)

whereai ∈ Z, |A| (the determinant ofA) =1, andA haseigenvalues�1,2 ∈ R − {−1,0,1}, R is the set of rationalnumbers. The detailed characteristics ofA are described inRefs. [26,28]. A set of successive points{S0, S1, S2, . . .},generated by Eq. (1), composes an orbitϑ of the system andthe initial pointS0=(x0, y0) classifiesϑ into two categories.Whenx0 and/ory0 are irrational,ϑ is infinite. When bothx0 andy0 are rational,ϑ is chaotic and periodic at everyRtimes, i.e.,SR = S0. R is called the “recurrence time”.

Voyatzis and Pitas[26] presented a one-parameter, two-dimensional, discrete Torus automorphism, shown in Eq.(2), for creating a unique and random mapping of the pixelswithin an image:

A =(

1 1k k + 1

),

(xi+1yi+1

)= A ×

(xiyi

)modN , (2)

where(xi , yi) ∈ [0, N −1]×[0, N −1] andk ∈ [0, N −1].The recurrence timeR depends upon the parametersk, N,and the initial point(x0, y0). In most cases,R is equal toN − 1 or N + 1, whenN is prime[26,28].

3. The proposed scheme

Our proposed scheme can perform both tamper detec-tion and recovery for tampered images. While tamper detec-

Page 3: Watermarking

P.L. Lin et al. / Pattern Recognition 38 (2005) 2519–2529 2521

Table 1The mapping of blocks using Eq. (3) withk = 37, 6, andN = 64

k X 1 2 3 4 5 6 7 8 33 34 35 36(x, y) (0,0) (0,1) (0,2) (0,3) (0,4) (0,5) (0,6) (0,7) (4,0) (4,1) (4,2) (4,3)

37 X′ 38 11 48 21 58 31 4 41 6 43 16 53(x′, y′) (4,5) (1,2), (5,7) (2,4) (7,1) (3,6) (0,3) (5,0) (0,5) (5,2) (1,7) (6,4)

6 X′ 7 13 19 25 31 37 43 49 7 13 19 25(x′, y′) (0,6) (1,4) (2,2) (3,0) (3,6) (4,4) (5,2) (6,0) (0,6) (1,4) (2,2) (3,0)

tion is achieved through a simple, block-based, three-levelinspection of in-block information only, the recovery of atampered block relies on its feature information hidden inanother block that can be determined by a one-dimensionaltransformation similar to Torus automorphism, as describedin Section 2. Our scheme can be best described through thefollowing three stages: watermark embedding, tamper de-tection, and tampered image recovery.

3.1. Block-based watermark embedding

We describe the watermark-embedding procedure in thissection. Each image is of sizeM × M pixels, whereM isassumed to be a multiple of four and the number of gray-levels is 256.

3.1.1. PreparationWe need to prepare a block-mapping sequenceA → B →

C → D → · · · → A for watermark embedding, where eachsymbol denotes an individual block. The intensity featureof block A will be embedded in blockB, and the intensityfeature of blockB will be embedded in blockC, etc.

Since the number of blocks in each dimension of mostimages can hardly be a prime number, we cannot obtain aone-to-one mapping among the blocks by applying Eq. (2),based on the analysis in Ref.[26]. Instead, we use a 1-Dtransformation as shown in Eq. (3) to obtain a one-to-onemapping sequence.

X′ = [f (X) = (k × X)modN ] + 1, (3)

whereX , X′(∈ [0, N −1]) are the block number,k (a primeand∈ [0, N − 1]) is a secret key, andN (∈ Z − {0}) is thetotal number of blocks in the image.

The generation algorithm of the block-mapping sequenceis as follows.

3.1.2. Block mapping sequence generation algorithm

1. Divide the image into non-overlapping blocks of 4× 4pixels.

2. Assign a unique and consecutive integerX ∈ {0,1,2,. . . , N − 1} to each block from left to right and top tobottom, whereN = (M/4) × (M/4).

3. Randomly pick a prime numberk ∈ [1, N − 1].4. For each block numberX, apply Eq. (3) to obtainX′, the

number of its mapping block.5. Record all pairs ofX andX′ to form the block mapping

sequence.

Note that the secret keyk must be a prime in order toobtain a one-to-one mapping; otherwise, the period is lessthan N and a many-to-one mapping may occur.Table 1lists some portions of the mapping sequence generated withN = 64, k = 37 and 6, respectively. In this table,X′ startsto repeat atX = 33 whenk = 6, which is not a prime.

3.1.3. Block watermark embeddingFor each blockB of 4×4 pixels, we further divide it into

four sub-blocks of 2×2 pixels, as shown inFig. 1. The wa-termark in each sub-block is a 3-tuple(v, p, r), where bothv andp are 1-bit authentication watermark, andr is a 6-bitrecovery watermark for the corresponding sub-block withinblock A mapped toB. The following algorithm describeshow the 3-tuple watermark of each sub-block is generatedand embedded.

3.1.4. Sub-block watermark generation and embeddingalgorithm

1. Set the two LSBs of each pixel within the block to zeroand compute the average intensity of the block and eachof its four sub-blocks, denoted byavg_B and avg_Bs ,respectively.

2. Generate the authentication watermarkv of each sub-block as in Eq. (4) below:

v ={

1 if avg_Bs �avg_B,

0 otherwise.(4)

3. Generate the parity-check bitp of each sub-block as inEq. (5) below:

p ={

1 if num is odd,0 otherwise,

(5)

Page 4: Watermarking

2522 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519–2529

(a) Block A and one of its sub-block

(b) Block B and one of its sub-block

1 3 9 11

2 4 10 12

5 7 13 15

6 8 14 16

a1 a2 a3 a4 a5 a6 a7 a8

1 3 9 11

2 4 10 12

5 7 13 15

6 8 14 16

avg_As

= (I1+I2+I3+I4)/4

r (c) The six MSBs of avg_As

v ` p of B

Fig. 1. Watermark generation procedure for the sub-block comprising pixels 1,2,3,4: (a) BlockA and one of its sub-block; (b) blockB andone of its sub-block; (c) the six MSBs ofavg_A.

bit 1 2 3 4 5 6 7 8

pixel 1

pixel 2

pixel 3

pixel 4

v rr

p rr

rr rr

rr rr

Original image data Embedding data

Fig. 2. The 8-bit Watermark(v, p, r) embedded in pixels 1,2,3,4.

wherenum is the total number of 1s in the six MSBs ofavg_Bs .

4. From the mapping sequence generated in the preparationstep, obtain blockA whose recovery information will bestored in blockB.

5. Compute the average intensity of each correspondingsub-blockAs within A, as shown inFig. 1(a), and denoteit avg_As .

6. Obtain the recovery intensityr of As by truncating thetwo LSBs inavg_As , as shown inFig. 1(c).

7. Embed the 3-tuple-watermark(v, p, r), eight bits in all,onto the two LSBs of each pixel withinBs , as shown inFig. 2.

The watermark generation procedure for the sub-blockcomprising pixels 1, 2, 3, and 4 is illustrated inFig. 1. Howthe 8-bit(v, p, r) are embedded in these four pixels is shownin Fig. 2.

3.2. Block-based hierarchical tamper detection

The test image is first divided into non-overlapping blocksof 4 × 4 pixels, as in the watermark embedding process.

For each block, denoted asB ′, we first set the two LSBs ofeach pixel inB ′ to zero and compute its average intensity,denoted asavg_B ′. We then perform 3-level hierarchicaldetection. In level-1 detection, we check each 2× 2 sub-block within one block. In level-2 detection, we treat a 4×4block as one unit. Finally, we check the block by extendingthe inspection view to its 3×3 block-neighborhood in level-3detection. Level-4 detection is for VQ-attack resiliency only.The procedure of our hierarchical tamper detection schemeis described in the following.

3.2.1. Hierarchical tamper detection algorithmLevel-1 detection. For each sub-blockB ′

s of 2 × 2 pixelswithin block B ′, perform the following steps:

1. Extractv andp from B ′s .

2. Set the two LSBs of each pixel within eachB ′s to zero

and compute the average intensity for each sub-blockB ′s ,

denoted asavg_B ′s .

3. Count the total number of 1s inavg_B ′s and denote itN ′

s .4. Set the parity-check bitp′ of B ′

s to 1 if N ′s is odd;

otherwise, set it to 0.5. Comparep′ with p. If they are not equal, markB ′

s erro-neous and complete the detection forB ′

s .6. Set the algebraic relationv′ = 1 if avg_B ′

s > = avg_B ′;otherwise, setv′ = 0.

7. Comparev′ with v. If they are not equal, markB ′s er-

roneous and complete the detection forB ′s ; otherwise,

mark it valid.

Level-2 detection. For each block of size 4× 4 pixels,mark this block erroneous if any of its sub-block is markederroneous; otherwise, mark it valid.

Page 5: Watermarking

P.L. Lin et al. / Pattern Recognition 38 (2005) 2519–2529 2523

Error B Error

Error ErrorError

Fig. 3. The 3× 3 block-neighborhood of blockB.

Level-3 detection. For each valid block of size 4×4 pixels,mark the block erroneous if there are five or more erroneousblocks in its 3× 3 block-neighborhood, as shown inFig. 3.

Level-4 detection(only required for resisting against VQattack). For each valid blockB ′ of size 4×4 pixels, performthe following steps:1. Find the block number of blockC using secret keyk

and Eq. (3). Note that blockC is the one in which theintensity feature of blockB ′ is embedded.

2. Locate blockC.3. If block C is marked erroneous, assume blockB ′ is cor-

rect and complete the test for blockB ′.4. If block C is valid, perform the following steps:

(a) Obtain the 6-bit should-be intensity of eachB ′s by

firstly extracting the two LSBs from each pixel inthe corresponding sub-block within blockC then dis-carding the bits forv, p and padding two 0s to theend to make an 8-bit value, denoted asavg_B1′

s .(b) Compute the average intensity of eachB ′

s with thetwo LSBs of each pixel set to zero beforehand anddenote itavg_B ′

s .(c) Compareavg_B ′

s with avg_B1′s and markB ′ erro-

neous if they are different.

3.3. Block-based tampered image recovery

After the detection stage, all the blocks are marked ei-ther valid or erroneous. We only need to recover the erro-neous blocks and leave those valid blocks as they are. Therestoration procedure for each erroneous block is describedas follows.

For convenience of description, we call the erroneousblock under recovery blockB and the block embedded withits intensity blockC.

3.3.1. Block recovery algorithm

1. Calculate the block number for block C using secret keyk and Eq. (3).

2. Locate blockC.3. If block C is marked erroneous, skip the recovery for this

block.4. If block C is valid, obtain the 6-bit-intensity of each sub-

block within blockB by firstly extracting the two LSBsfrom each pixel in the corresponding sub-block withinblock C then discarding the bitsv andp.

5. Pad the 6-bit-intensity with two 0s to the end and replacethe intensity of each pixel within the sub-block with thisnew 8-bit intensity.

6. Repeat step 5 for all four sub-blocks within blockB andmark blockB valid.

4. Experimental results

We conduct three experiments to test the performance ofour proposed scheme on both tamper detection and tamperedimage restoration.

4.1. Performance on images with slight to median degreeof tampering

We use four images: Home, Car, Fingerprint, and Beach,as shown inFigs. 4(a)–7(a), for this experiment. All are ofsize 256× 256 pixels. The experiments and their respectiveresults are described in the following.

(a) The number on the doorplate in the watermarkedHome has been modified, as shown inFig. 4(b). The sizeof the modification is about 4× 12. Fig. 4(c) shows thedetected tamper area using level-1 detection, andFig. 4(d)shows the recovered Home.

(b) The number on the license plate in the watermarkedCar has been wiped out, as shown inFig. 5(b). The size ofthe modification is about 68× 20. Figs. 5(c) and (e) showthe detected tamper area using hierarchical level-1 and -2inspections, andFigs. 5(d) and (f) show the recovered Car,respectively.

(c) The watermarked Fingerprint, as shown inFig. 6(a),has been slightly and randomly modified, as shown in

Fig. 4. (a) The watermarked Home; (b) tampered Home; (c) de-tected erroneous region; (d) recovered Home.

Page 6: Watermarking

2524 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519–2529

Fig. 5. (a) The watermarked Car; (b) tampered Car; (c,e) detectederroneous region; (d,f) recovered Car.

Fig. 6. (a) The watermarked Fingerprint; (b) tampered Fingerprint;(c,e) detected erroneous regions; (d,f) recovered Fingerprints.

Fig. 6(b). ComparingFigs. 6(a) with (b), we can hardly dif-ferentiate one from the other. Using our method, we candetect the modifications, as shown inFigs. 6(c) and (e) withonly level-1 detection, or both level-1 and -2 detections, re-spectively. The size of the smallest modification is about

Fig. 7. The watermarked Beach; (b) tampered Beach; (c,e,g) de-tected erroneous regions; (d,f,h) recovered Beaches.

8 × 8 pixels.Figs. 6(d) and (f) show the recovered Finger-prints, respectively.

(d) The watermarked Beach, as shown inFig. 7(a), hasbeen inserted with a deer, as shown inFig. 7(b). The modifi-cation is so natural that one can hardly suspect any changesthat had been made to this picture. Using our method, wecan detect the modification, as shown inFigs. 7(c), (e), and(g) with only level-1, both level-1 and -2, or all three lev-els of detection, respectively. The size of the modificationis about 68× 68 pixels.Figs. 7(d), (f), and (h) show therecovered Beaches, respectively.

4.2. Performance of tamper detection on 100% tamperedimages

We test the tamper detection capability for large tam-pered area with image Lena, as shown inFig. 8(a). Allblocks in image Lena are 100% altered by the four followingmethods.

M1: Covering the whole image with leaf patterns, as de-picted inFig. 8(b).

Page 7: Watermarking

P.L. Lin et al. / Pattern Recognition 38 (2005) 2519–2529 2525

Fig. 8. (a) Unaltered image; (b–e) All blocks in (a) are 100%altered by method M1–M4, respectively.

Table 2The miss detection rates after each level of inspection

Image Home Car Fingerprint Beach

Level-1 11.62% 10.58% 11.84% 11.56%Level-2 0.35% 0.37% 0.32% 0.34%Level-3 0% 0% 0% 0%

M2: Covering the whole image with another image, asdepicted inFig. 8(c).

M3: Covering the whole image with fruit patterns, asdepicted inFig. 8(d).

M4: Spreading plenty of mist to the whole image, asdepicted inFig. 8(e).

The test results are listed inTable 2and summarized asfollows:

(a) With only level-1 detection, the maximum rate of missdetection is less than 12%.

(b) With both level-1 and level-2 detections, the maximummiss detection rate drops significantly to 0.37%.

(c) With level-1, -2, and -3 detections, all tampered blocksare detected.

4.3. Performance of restoration on distribution oftampered blocks

In this experiment, we want to find out how well a tam-pered image can be recovered with respect to different sizesand distributions of tampering. The tampered blocks can bein a form of either single tampered chunk or spread tam-pered blocks. We altered image Lena 10–50% in total withboth types of tampering distribution, as shown inFig. 9.

The recovering rates of both types of tampering distribu-tion with respect to the rate of tampering are depicted inFigs. 10and11, and can be summarized as follows.

Fig. 9. 10–50% Tampered Lena with two types of tampering dis-tribution: single-tampered-chunk and spread-tampered-blocks.

(a) The recovering rate for single-tampered images is bet-ter than 99% when the rate of tampering is less than 16%, isabout 94% when the rate of tampering is 40%, and is about93% when the rate of tampering increases to 50%.

(b) The recovering rate for spread-tampered images isbetter than 99% when the rate of tampering is less than30%, is about 96% when the rate of tampering is 40%, andis about 94% when the rate of tampering increases to 50%.

(c) The recovering rate for spread-tampered images isalmost twice as better as that for single-tampered imageswhen the rate of tampering is less than 30%, is 30% betterwhen the rate of tampering is between 30% and 50%, andis 20% better when the rate of tampering increases to 50%.

Page 8: Watermarking

2526 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519–2529

0

50

100

150

200

250

300

350

400

450

500

550

600

650

700

16% 26% 30% 37% 39% 41% 48% 51% 54% 57% 60% 63% 70%

The numberof altered blocks/ the number of total blocks

The

num

ber

of b

lock

s w

ithou

t res

torin

g (t

otal

blo

cks=

4096

)

Fig. 10. The number of un-recovered blocks for single-tampered-chunk.

0

50

100

150

200

250

20% 24% 28% 30% 33% 36% 39% 41% 45% 48% 50%

The number of altered blocks / the number of total blocks

The

num

ber

of b

lock

s w

ithou

t res

torin

g (t

otal

blo

cks=

4096

)

Fig. 11. The number of un-recovered blocks for spread-tampered-blocks.

5. Performance analyses

In this section, we analyze the performance of our methodfrom aspects of the fidelity of watermarked images, the qual-ity of recovered images, as well as the tamper detection rate.

5.1. Image quality analysis

We usePSNRdefined in Eq. (6) as the indicator ofthe quality of both watermarked images and recovered

images.

PSNR= 10× log102552

MSEdB, (6)

where MSE= (1/m × n)∑i<n

i=0∑j<m

j=0 (c′ij

− cij )2, m, n

are the width and the length of the image, respectively,andc, c′ are the pixel intensities of the two images undercomparison.

(a)PSNR of the watermarked image.Since only two LSBsof each pixel are used for embedding the watermark, the

Page 9: Watermarking

P.L. Lin et al. / Pattern Recognition 38 (2005) 2519–2529 2527

Table 3The PSNRs of the watermarked images

Image Home Fingerprint Car Beach

PSNR(in dB) 44.36 44.36 44.39 44.37

PSNRs of the watermarked images are all better than 44 dB,as listed inTable 3. As compared with the scheme in Ref.[20] that only uses one LSB to embed the watermark, thequality of the images watermarked by our scheme is de-graded about 5–6 dB.

(b) PSNR of the recovered image.The PSNRof a re-covered image depends how well the tampered blocks arerecovered. The recovery depends on how accurately thosetampered blocks are detected. And, the tampering detectiondepends on both the size and the distribution of tampering.Table 4lists thePSNRof five recovered images with var-ious sizes and distributions of tampering. From this table,we find that among all the single tampered images, Homehas the bestPSNRof 48.48 dB, which is recovered froma tampered chunk of 4× 12 pixels. Car-1 has the secondbestPSNRof 38.12 dB, which is recovered from a tamperedchunk of size 24× 16. Car-2 hasPSNRof 32.52 dB, whichis recovered from a tampered chunk of size 68× 20. Beachhas the worstPSNRof 30.85 dB, which is recovered froma tampered chunk of size 68× 68. For spread tampering,Fingerprint hasPSNRof 36.46 dB, which is recovered froma total tampered area of size 70× 16. Comparing the re-sults of Fingerprint and Car-2, we find that thePSNRofFingerprint is much better than that of Car-2, even thoughthe sizes of total tampering for both images are not muchdifferent.

5.2. Tamper detection analysis

We analyze the detection algorithm from the followingaspects:

(a) Level-1 detection: If the type of error is parity error,then we are sure that the sub-block is indeed erroneous.

(b) Level-2 detection: If the type of error is intensity-relationship error, we cannot be sure whether the sub-blockunder inspection is erroneous or other sub-blocks within thesame block are erroneous. However, some pixels within theblock must be wrong. Thus, in case the tampered sub-blockis not detected in level-1 inspection, the whole block willbe marked erroneous after level-2 inspection.

Table 4The PSNRs of the recovered images relative to the watermarked images

Image Home Fingerprint Car-1 Car-2 Beach

Size of tamper 4× 12 70× 16 24× 16 68× 20 68× 68PSNR(in dB) 48.48 36.46 38.12 32.52 30.85

The probability of failing both the parity check and theintensity-relation check simultaneously is at most(1/2) ×(1/2) = 1/4. So the probability of false detection for allfour sub-blocks will be at most(1/4)4�0.39%, based onthe production rule of statistics. Thus, almost all erroneousblocks can be detected after level-2 inspection.

(c) Level-3 detection: From (b), we know that theprobability of failing to detect one tampered block af-ter level-2 detection is at most 1/256. Thus, the missdetection rate after level-3 detection is the probabil-ity of failing to detect more than four tampered blockswithin the 3× 3-block-neighborhood, which is less thanC(9,4)(1/256)4>1/225�0.

From the experimental results inTable 2, we find that themaximum missing rate after level-1, -2, and -3 detection is12%, 0.37%, and 0%, respectively, which are quite consis-tent with the calculated probability derived for each level.Thus, we summarize the detection capability of our methodas follows:

• Our method can detect any tampering of size 12× 12pixels or bigger without a single miss.

• Our method can detect any tampering of size 4×4 pixelswith a missing rate less than 0.37%.

• Our method can detect any tampering of size 2×2 pixelswith a missing rate less than 12%.

6. Conclusion

We have presented a hierarchical digital watermarkingscheme for both image tamper detection and restoration inthis paper. Our scheme is efficient in execution time sinceit only uses simple operations such as parity check andcomparisons. It is effective in detection accuracy since itinspects the image hierarchically with the inspection viewgrows along with the hierarchy. It is also very storage effec-tive since it only requires a secret key and a public chaoticmixing algorithm for both tamper detection and recovery.The experimental results demonstrate that the precision oftamper detection and localization is close to 100% afterlevel-2 inspection and the tamper recovery rate is better than93% for a less than half tampered image. As compared withthe method in Ref.[20], our method is not only as simpleand as effective in tamper detection and localization, it alsoprovides with the capability of tamper recovery by tradingoff the quality of the watermarked images about 5 dB. Our

Page 10: Watermarking

2528 P.L. Lin et al. / Pattern Recognition 38 (2005) 2519–2529

future research includes improvements on both security andwatermark-payload reduction while maintaining the capa-bility of both tamper detection and recovery.

References

[1] G.I. Friedman, The trustworthy digital camera: restoringcredibility to the photographic image, in: Proceedings of theIEEE International Conference on Image Processing, vol. II,Chicago, IL, USA, October 1998, pp. 409–413.

[2] J. Dittmann, A. Steinmetz, R. Steinmetz, Content-baseddigital signature for motion pictures authentication andcontent-fragile watermarking, in: Proceedings of the IEEEInternational Conference on Multimedia Computing Systems,1999, pp. 209–213.

[3] C.Y. Lin, S.F. Chang, A robust image authentication methodsurviving JPEG lossy compression, Proc. SPIE 3312 (1998)296–307.

[4] C.S. Lu, H.Y.M. Liao, C.J. Sze, Structural digital signature forimage authentication: an incidental distortion resistant scheme,in: Proceedings of the Multimedia Security Workshop 8thACM International Conference on Multimedia, Los Angeles,CA, 2000, pp. 115–118.

[5] W. Stallings, Network Security Essentials: Application andStandards, Prentice-Hall, Upper Saddle River, NJ, 2000.

[6] J. Fridrich, Image watermarking for tamper detection, in:Proceedings of the IEEE International Conference on ImageProcessing, vol. II, Chicago, IL, USA, October 1998, pp.404–408.

[7] J. Fridrich, M. Goljan, A.C. Baldoza, New fragileauthentication watermark for images, in: Proceedings ofthe IEEE International Conference on Image Processing,Vancouver, BC, Canada, September 2000, pp. 10–13.

[8] D. Kundur, D. Hatzinakos, Toward a telltale watermarkingtechnique for tamper-proofing, in: Proceedings of the IEEEInternational Conference on Image Processing, vol. 2, 1998,pp. 409–413.

[9] E. Lin, E.J. Delp, A review of fragile image watermarks, in:Proceedings of the ACM Multimedia and Security Workshop,Orlando, FL, November 1999, pp. 35–40.

[10] M.P. Queluz, Content-based integrity protection of digitalimage, Proceedings of the SPIE, Security and Watermarkingof Multimedia Contents II, vol. 3971, Bellingham, WA, 2000,pp. 85–93.

[11] M. Schneider, S.F. Chang, A robust content based digitalsignature for image authentication, in: Proceedings of theIEEE International Conference on Image Processing, vol. III,Lausanne, Switzerland, September 1996, pp. 227–230.

[12] P.W. Wong, A public key watermark for image verificationand authentication, in: Proceedings of the IEEE InternationalConference on Image Processing, Chicago, IL, October 1998,pp. 455–459.

[13] M.M. Yeung, F. Mintizer, An invisible watermarkingtechnique for image verification, in: Proceedings of the IEEEInternational Conference on Image Processing, vol. I, SantaBarbara, CA, October 1997, pp. 680–683.

[14] R.L. Lagendijk, G.C. Langelaar, I. Setyawan, Watermarkingdigital images and video data, IEEE Signal Process. Mag. 17(2000) 20–46.

[15] F. Hartung, M. Kutter, Multimedia watermarking techniques,Proc. IEEE 87 (1999) 1079–1107.

[16] M.D. Swanson, M. Kobayashi, A.H. Tewfik, Multimedia dataembedding and watermarking technologies, Proc. IEEE 86(1988) 1064–1087.

[17] I.J. Cox, M.I. Miller, A.L. Mckellips, Watermarking ascommunications with side information, Proc. IEEE 87 (1999)1127–1147.

[18] C.De. Vleeschouwer, J.F. Delaigle, B. Macq, Invisibility andapplication functionalities in perceptual watermarking—anoverview, Proc. IEEE 90 (1) (2002) 64–77.

[19] C.W. Wu, D. Coppersmith, F.C. Mintizer, C.P. Tresser, M.M.Mueng, Fragile imperceptible digital watermark and privacycontrol, Proceedings of the SPIE, Security and Watermarkingof Multimedia Contents, vol. 3657, January 1999, pp.79–84.

[20] M.U. Celik, G. Sharma, E. Saber, A.M. Tekalp,Hierarchical watermarking for secure image authenticationwith localization, IEEE Trans. Image Process. 11 (6) (2002)585–594.

[21] D. Kundur, D. Hatzinakos, Digital watermarking for telltaletamper proofing and authentication, Proc. IEEE 87 (1999)1167–1180.

[22] J. Eggers, B. Girod, Blind watermarking applied to imageauthentication, in: Proceedings of the IEEE ICASSP, Salt LakeCity, UT, May 2001, pp. 1977–1980.

[23] S. Bhattacharjee, M. Kutter, Compression tolerant imageauthentication, in: Proceedings of the IEEE InternationalConference on Image Processing, Chicago, IL, October 1998,pp. 435–439.

[24] C.S. Lu, H.Y. Liao, Multipurpose watermarking for imageauthentication and protection, IEEE Trans. Image Process. 10(2001) 1579–1592.

[25] M. Holliman, N. Memon, Counterfeiting attacks on obliviousblock-wise independent invisible watermarking schemes,IEEE Trans. Image Process. 9 (2000) 432–441.

[26] G. Voyatzis, l. Pitas, Chaotic mixing of digital imagesand applications to watermarking, in: Proceedings of theEuropean Conference on Multimedia Applications Servicesand Techniques (ECMAST’96), 1996, pp. 687–689.

[27] P.W. Wong, N. Memon, Secret and public key authenticationschemes that resist vector quantization attack, Proc. SPIE 3971(75) (2002) 417–427.

[28] G. Voyatzis, I. Pitas, Applications of toral automorphismsin image watermarking, in: Proceedings of the InternationalConference on Image Processing, vol. II, 1996, pp. 237–240.

About the Author —PHEN LAN LIN received the B.S. degree in Engineering Science from National Cheng-Kung University, Taiwan in1973, the M.S. degree in Mathematics from Texas Tech University, Texas in 1978, and both the M.S. and Ph.D. degrees in ElectricalEngineering from Southern Methodist University, Dallas, Texas in 1992 and 1994, respectively.

Page 11: Watermarking

P.L. Lin et al. / Pattern Recognition 38 (2005) 2519–2529 2529

Dr. Lin was with Texas Instruments (TI) in Dallas, Texas as a member of technical staff, lead engineer, and project manager from 1978 to1992. Her working experiences include control and computer vision software development, mobile robot navigation, as well as automaticIC inspection project management.She has been a professor in the Department of Computer Science and Information Management, Providence University, Taiwan since 2001and is a professor in the Department of Computer Science and Information Engineering. She has also been serving as the Director ofComputer and Communication Center in the university since 2001.Her current research interests are in the fields of multimedia security, network security, medical imaging, and visual inspection.

About the Author —CHUNG-KAI HSIEH received the B.S. degree in Computer Science and Information Management from ProvidenceUniversity, Taiwan in 2002 and the M.S. degree in Computer Science from Chung Hsing University, Taiwan in 2004.His research interests are in the fields of multimedia and network security.

About the Author —PO-WHEI HUANG received the B.S. degree in Applied Mathematics from National Chung-Hsing University in 1973,the MS degree in mathematics from Texas Tech University in 1978, and the Ph.D. degree in Computer Science and Engineering fromSouthern Methodist University in 1989.He was with Texas Instruments in Dallas as a member of technical staff, supervisor, lead engineer, section manager, and software developmentmanager from 1978 to 1991. His working experiences include bubble memory testing and application, IC design automation, Lisp machineon a chip design, automatic program generation, production planning and scheduling, and wafer factory automation.He was the department head and has been a professor in the Computer Science Department at National Chung-Hsing University. SinceSeptember 2002, he has also been serving as the vice president of National Huwei University of Science and Technology located in YunlinCounty of Taiwan.His current research interests are in the fields of multimedia database, medical imaging, visual inspection, pattern recognition, and artificialintelligence.