TY - JOUR
T1 - Watermarking-based image authentication with recovery capability using halftoning technique
AU - Rosales-Roldan, Luis
AU - Cedillo-Hernandez, Manuel
AU - Nakano-Miyatake, Mariko
AU - Perez-Meana, Hector
AU - Kurkoski, Brian
N1 - Funding Information:
We thank the National Science and Technology Council of Mexico , National Polytechnic Institute of Mexico and the National Autonomous University of Mexico by support provided during the realization of this research. Special thanks for the reviewers who contributed to improve this paper with helpful suggestions.
PY - 2013/1
Y1 - 2013/1
N2 - In this paper two watermarking algorithms for image content authentication with localization and recovery capability of the tampered regions are proposed. In both algorithms, a halftone version of the original gray-scale image is used as an approximated version of the host image (image digest) which is then embedded as a watermark sequence into given transform domains of the host image. In the first algorithm, the Integer Wavelet Transform (IWT) is used for watermark embedding which is denominated WIA-IWT (Watermarking-based Image Authentication using IWT), while in the second one, the Discrete Cosine Transform (DCT) domain is used for this purpose, we call this algorithm WIA-DCT (Watermarking-based Image Authentication using DCT). In the authentication stage the tampered regions are detected using the Structural Similarity index (SSIM) criterion, which are then recovered using the extracted halftone image. In the recovery stage, a Multilayer Perceptron (MLP) neural network is used to carry out an inverse halftoning process to improve the recovered image quality. The experimental results demonstrate the robustness of both algorithms against content preserved modifications, such as JPEG compression, as well as an effective authentication and recovery capability. Also the proposed algorithms are compared with some previously proposed content authentication algorithms with recovery capability to show the better performance of the proposed algorithms.
AB - In this paper two watermarking algorithms for image content authentication with localization and recovery capability of the tampered regions are proposed. In both algorithms, a halftone version of the original gray-scale image is used as an approximated version of the host image (image digest) which is then embedded as a watermark sequence into given transform domains of the host image. In the first algorithm, the Integer Wavelet Transform (IWT) is used for watermark embedding which is denominated WIA-IWT (Watermarking-based Image Authentication using IWT), while in the second one, the Discrete Cosine Transform (DCT) domain is used for this purpose, we call this algorithm WIA-DCT (Watermarking-based Image Authentication using DCT). In the authentication stage the tampered regions are detected using the Structural Similarity index (SSIM) criterion, which are then recovered using the extracted halftone image. In the recovery stage, a Multilayer Perceptron (MLP) neural network is used to carry out an inverse halftoning process to improve the recovered image quality. The experimental results demonstrate the robustness of both algorithms against content preserved modifications, such as JPEG compression, as well as an effective authentication and recovery capability. Also the proposed algorithms are compared with some previously proposed content authentication algorithms with recovery capability to show the better performance of the proposed algorithms.
KW - Content authentication
KW - DCT
KW - Halftoning
KW - IWT
KW - Recovery capability
KW - SSIM criterion
KW - Watermarking
UR - http://www.scopus.com/inward/record.url?scp=84871721013&partnerID=8YFLogxK
U2 - 10.1016/j.image.2012.11.006
DO - 10.1016/j.image.2012.11.006
M3 - Artículo
SN - 0923-5965
VL - 28
SP - 69
EP - 83
JO - Signal Processing: Image Communication
JF - Signal Processing: Image Communication
IS - 1
ER -