Abstract

With the development of image editing software techniques, the content integrity and authenticity of original digital images become more and more important in digital content security. A novel image tampering detection and recovery algorithm based on digital watermarking technology and a chaotic system is proposed, and it can effectively locate the tampering region and achieve the approximate recovery of the original image by using the hidden information. The pseudo-random cyclic chain is realized by the chaotic system to construct the mapping relationship between the image subblocks. It can effectively guarantee the randomness of the positional relationship between the hidden information and the original image block for the better ergodicity of the pseudo-random chain. The recovery value optimization algorithm can represent image information better. In addition to the traditional Level-1 recovery, a weight adaptive algorithm is designed to distinguish the original block from the primary recovery block, allowing 3 × 3 neighbor block recovery to achieve better results. The experimental results show that the hierarchical tamper detection algorithm makes tamper detection have higher precision. When facing collage attacks and large general tampering, it will have higher recovery image quality and better resistance performance.

Highlights

  • With the development of digital portable devices, such as cell phone and digital camera, the images can be acquired more conveniently

  • The authenticity and integrity are so important in digital content security that more and more researchers focus on this field

  • To authenticate the integrity of the digital image and locate the tamper area, a novel image self-recovery scheme based on watermarking technique is proposed

Read more

Summary

A Novel Image Tamper Detection and Self-Recovery

Yewen Li 1,2,3 , Wei Song 1,2,∗ , Xiaobing Zhao 1,2 , Juan Wang 1 and Lizhi Zhao 1. National Language Resource Monitoring and Research Center of Minority Languages, Minzu University of. Received: 3 September 2019; Accepted: 7 October 2019; Published: 12 October 2019

Introduction
Double Pseudo-Random Chain
Proposed Scheme
Block Mapping
Watermark Generation
Watermark Embedding
Hierarchical Tamper Detection
Image Recovery
Experimental Results and Performance Analysis
First Kind of Collage Attack
Second Kind of Collage Attack
Performance on Large General Tampering
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call