Perceptual Mapping-Based Image Tamper Detection and Recovery Algorithm

被引:0
|
作者
Taha, Taha Basheer [1 ,2 ]
Ngadiran, Ruzelita [2 ]
Taha, Dujan B. [3 ]
机构
[1] Tishk Int Univ, Fac Appl Sci, Erbil, Kurdistan Reg, Iraq
[2] Univ Malaysia Perlis, Fac Elect Engn Technol, Ctr Excellence Adv Comp AdvComp, Perlis, Malaysia
[3] Univ Mosul, Coll Comp Sci & Math, Software Engn Dept, Mosul, Iraq
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The importance of digital image authentication has grown in the last decade particularly with the widespread availability of digital media and image manipulation tools. As a result, different techniques were developed to detect fraudulent alterations in digital images and restore the original data. In this paper, a new algorithm is proposed to authenticate images by hiding a copy of the approximation band in the original image. The approximation band is hidden by embedding it inside the image pixels. The intensity of the hiding was decided using a perceptual map that simulates the human vision system and adds more intensity in areas where the human eye cannot recognize changes. The perceptual map consists of three parts, luminance mask, texture mask, and edge detection mask. Results show a high ability to blindly recover images after different attacks such as removing and blocking attacks. At the same time, the structure similarity index of resultant images was higher than 0.99 for all tested images.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Subsampling-Based Image Tamper Detection and Recovery Using Quick Response Code
    Wu, Wen-Chuan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 201 - 216
  • [42] Image tamper detection and recovery using adaptive embedding rules
    Hsu, Ching-Sheng
    Tu, Shu-Fen
    MEASUREMENT, 2016, 88 : 287 - 296
  • [43] A Reversible Medical Image Watermarking for ROI Tamper Detection and Recovery
    Siddharth Bhalerao
    Irshad Ahmad Ansari
    Anil Kumar
    Circuits, Systems, and Signal Processing, 2023, 42 : 6701 - 6725
  • [44] An Image Tamper Detection and Recovery Method Based on Self-Embedding Dual Watermarking
    Kiatpapan, Sawiya
    Kondo, Toshiaki
    2015 12TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), 2015,
  • [45] A novel fragile watermarking scheme for image tamper detection and recovery
    朱少敏
    刘建明
    Chinese Optics Letters, 2010, 8 (07) : 661 - 665
  • [46] An Image Tamper Detection and Recovery Method Using Multiple Watermarks
    Pongsomboon, Paween
    Kondo, Toshiaki
    Kamakura, Yoshiyuki
    2016 13TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), 2016,
  • [47] Tamper detection and image recovery for BTC-compressed images
    Yu-Chen Hu
    Kim-Kwang Raymond Choo
    Wu-Lin Chen
    Multimedia Tools and Applications, 2017, 76 : 15435 - 15463
  • [48] Tone mapping-based high-dynamic-range image compression: study of optimization criterion and perceptual quality
    Narwaria, Manish
    Da Silva, Matthieu Perreira
    Le Callet, Patrick
    Pepion, Romuald
    OPTICAL ENGINEERING, 2013, 52 (10)
  • [49] A Reversible Medical Image Watermarking for ROI Tamper Detection and Recovery
    Bhalerao, Siddharth
    Ansari, Irshad Ahmad
    Kumar, Anil
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2023, 42 (11) : 6701 - 6725
  • [50] A hierarchical digital watermarking method for image tamper detection and recovery
    Lin, PL
    Hsieh, CK
    Huang, PW
    PATTERN RECOGNITION, 2005, 38 (12) : 2519 - 2529