تشخیص و بازیابی تصاویر تحت حملات با نرخ دستکاری بالا
الموضوعات :فرانک توحیدی 1 , محمدرضا هوشمنداصل 2
1 - دانشگاه یزد
2 - دانشگاه محقق اردبیلی
الکلمات المفتاحية: نهاننگاری, تشخیص دستکاری, بازیابی داده, بازیابی تصویر,
ملخص المقالة :
در سالهای اخیر با رشد روزافزون فناوریهای دیجیتال، نسخهبرداری عکسهای دیجیتال و حتی تغییر آنها بدون افت کیفیت و با هزینه اندک امکانپذیر شده است. نهاننگاری، یکی از روشهای موفق تشخیص دستکاری و حتی بازیابی دادههای اصلی میباشد؛ ولی هنوز مشکلات زیادی برای ارائه یک نهاننگار مناسب که قادر به تشخیص و بازیابی هر نوع دستکاری باشد، وجود دارد. این مشکلات خصوصاً در مواردی که حملات خاص دستکاری با نرخ بالا صورت میگیرد حادتر خواهد بود. در این مقاله یک روش نهاننگار معرفی شده که نهتنها قادر به تشخیص هر گونه دستکاری است، بلکه در نرخهای بالای دستکاری نیز میتواند دادههای اصلی را با کیفیت بالا بازیابی کند. در این مقاله برای تشخیص دستکاری از تجزیه به مؤلفههای تکین (SVD) استفاده میشود. همچنین نهاننگار برای بازیابی دادههای از دست رفته از روش مبتنی بر OIBTC استفاده میکند. این مقاله روشی کارا برای افزایش حساسیت تشخیص و در عین حال افزایش مقاومت نهاننگار برای بازیابی ارائه میدهد. نتایج بهدستآمده برتری روش پیشنهادشده را نسبت به روشهای اخیر ثابت میکنند.
[1] L. Rakhmawati, W. Wirawan, and S. Suwadi, "A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability," EURASIP J. on Image and Video Processing, vol. 2019, Article ID: 61, 2019.
[2] B. B. Haghighi, A. H. Taherinia, and A. H. Mohajerzadeh, "TRLG: fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with optimized quality using LWT and GA," Information Sciences, vol. 486, pp. 204-230, Jun. 2019.
[3] C. Qin, C. Chang, and P. Chen, "Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism," Signal Processing, vol. 92, no. 4, pp. 1137-1150, Apr. 2012.
[4] Y. Huo, H. He, and F. Chen, "Alterable-capacity fragile watermarking scheme with restoration capability," Optics Communications, vol. 285, no. 7, pp. 1759-1766, Apr. 2012.
[5] C. Qin, P. Ji, C. C. Chang, J. Dong, and X. Sun, "Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery," IEEE MultiMedia, vol. 25, no. 3, pp. 36-48, Jul.-Sept. 2018.
[6] M. Hamid and C. Wang, "Adaptive image self-recovery based on feature extraction in the DCT domain," IEEE Access, vol. 6, pp. 67156-67165, 2018.
[7] B. B. Haghighi, A. H. Taherinia, and A. Harati, "TRLH: fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique," J. of Visual Communication and Image Representation, vol. 50, pp. 49-64, Jan. 2018.
[8] K. Sreenivas and V. Kamakshiprasad, "Improved image tamper localisation using chaotic maps and self-recovery," J. of Visual Communication and Image Representation, vol. 49, pp. 164-176, Nov. 2017.
[9] C. S. Hsu and S. F. Tu, "Image tamper detection and recovery using adaptive embedding rules," Measurement, vol. 88, pp. 287-296, Jun. 2016.
[10] A. Azeroual and K. Afdel, "Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet," AEU-International J. of Electronics and Communications, vol. 79, pp. 207-218, Sept. 2017.
[11] R. O. Preda, "Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain," Measurement, vol. 46, no. 1, pp. 367-373, Jan. 2013.
[12] C. Qin and X. Zhang, "Effective reversible data hiding in encrypted image with privacy protection for image content," J. of Visual Communication and Image Representation, vol. 31, pp. 154-164, Aug. 2015.
[13] M. A. Wahed and H. Nyeem, "High capacity reversible data hiding with interpolation and adaptive embedding," PloS One, vol. 14, no. 3, Article ID: e0212093, 2019.
[14] X. T. Wang, C. C. Chang, T. S. Nguyen, and M. C. Li, "Reversible data hiding for high quality images exploiting interpolation and direction order mechanism," Digital Signal Processing, vol. 23, no. 2, pp. 569-577, Mar. 2013.
[15] A. Malik, G. Sikka, and H. Kumar Verma, "An image interpolation based reversible data hiding scheme using pixel value adjusting feature," Multimedia Tools and Applications, vol. 76, no. 11, pp. 13025-130462017.
[16] C. Qin, P. Ji, X. Zhang, J. Dong, and J. Wang, "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280-293, Sept. 2017.
[17] A. Shehab, M. Elhoseny, K. Muhammad, A. K. Sangaiah, P. Yang, H. Huang, and G. Hou, "Secure and robust fragile watermarking scheme for medical images," IEEE Access, vol. 6, pp. 10269-10278, 2018.
[18] F. Tohidi and M. Paul, "A new image watermarking scheme for efficient tamper detection, localization and recovery," in Proc. IEEE Int. Conf. on Multimedia & Expo Workshops, ICMEW'19, pp. 19-24, Shanghai, China, 8-12 Jul. 2019.
[19] F. Tohidi, M. Paul, M. R. Hooshmandasl, S. Chakraborty, and B. Pradhan, "Block-wise authentication and recovery scheme for medical images focusing on content complexity," in Proc. 10th Pacific-Rim Symp. on Image and Video Technology, pp. 86-99, Sydney, Australia, 18-22 Nov. 2019.
[20] A. M. Joshi, A. Darji, and V. Mishra, "Design and implementation of real-time image watermarking," in Proc. IEEE In. Conf. on Signal Processing, Communications and Computing, ICSPCC'11, 5 pp., Xi'an, China, 14-16 Sept. 2011.
[21] F. Tohidi, M. Paul, M. R. Hooshmandasl, T. Debnath, and H. Jamshidi, "Efficient self-embedding data hiding for image integrity verification with pixel-wise recovery capability," in Proc. Pacific-Rim Symp. on Image and Video Technology, pp. 128-141, Sydney, Australia, 18-22 Nov. 2019.
[22] Y. Xiang, D. Xiao, H. Wang, and X. Li, "A secure image tampering detection and self-recovery scheme using POB number system over cloud," Signal Processing, vol. 162, pp. 282-295, Sept. 2019.
[23] C. Kim and C. N. Yang, "Self-embedding fragile watermarking scheme to detect image tampering using AMBTC and OPAP approaches," Applied Sciences, vol. 11, no. 3, Article ID:. 1146, 2021.
[24] E. Gul and S. Ozturk, "A novel pixel-wise authentication-based self-embedding fragile watermarking method," Multimedia Systems, vol. 27, pp. 531-545, Jun. 2021.