Halftoning-based self-embedding watermarking for image authentication and recovery

Jose Antonio Mendoza-Noriega, Brian M. Kurkoski, Mariko Nakano-Miyatake, Hector Perez-Meana

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

This paper presents a block-wise semi-fragile watermarking algorithm for image content authentication, with tamper region localization and recovery capability. A halftone image is generated by the error diffusion halftoning method and embedded using the Quantization Index Modulation (QIM) method in the Discrete Cosine Transform (DCT) domain of the original image. The proposed method is robust to JPEG compression, because the halftone image is embedded as a watermark sequence in the middle frequencies of the DCT coefficients using QIM. Also to improve the recovered image quality, Multilayer Perceptron neural network (MLP) is used in inverse halftoning process. Data in the tampered region is estimated with gray-scale data obtained from the MLP, using the embedded halftone as input. The experimental results show desirable performance of the proposed algorithm, such as watermark imperceptibility, robustness to JPEG compression, detection accuracy of tampered region and high quality of recovered image.

Original languageEnglish
Title of host publication2010 IEEE International 53rd Midwest Symposium on Circuits and Systems, MWSCAS 2010
Pages612-615
Number of pages4
DOIs
StatePublished - 2010
Event53rd IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2010 - Seattle, WA, United States
Duration: 1 Aug 20104 Aug 2010

Publication series

NameMidwest Symposium on Circuits and Systems
ISSN (Print)1548-3746

Conference

Conference53rd IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2010
Country/TerritoryUnited States
CitySeattle, WA
Period1/08/104/08/10

Fingerprint

Dive into the research topics of 'Halftoning-based self-embedding watermarking for image authentication and recovery'. Together they form a unique fingerprint.

Cite this