Zhou 2015
Zhou 2015
Zhou 2015
ARTICLE IN PRESS
AEUE 51503 18
Q1
Wujie Zhou a,b, , Lu Yu a , Zhongpeng Wang b , Mingwei Wu b , Ting Luo c , Lihui Sun b
a
Institute of Information and Communication Engineering, Zhejiang University, Hangzhou 310027, China
School of Information and Electronic Engineering, Zhejiang University of Science & Technology, Hangzhou 310023, China
College of Science & Technology, Ningbo University, Ningbo 315211, China
a r t i c l e
8
20
i n f o
a b s t r a c t
Article history:
Received 12 May 2015
Accepted 12 October 2015
10
11
12
13
19
Keywords:
Stereoscopic image
Watermarking
Binocular visual characteristics
Authentication
Tamper detection
21
1. Introduction
14
15
16
17
18
In the past decade, various fragile digital watermarking techniques have been proposed for monoscopic
image authentication and temper detection. In this paper, a novel binocular visual characteristics based
pixel-wise fragile watermarking scheme for stereoscopic image authentication and tamper detection is
proposed. The scheme consists of two processes: embedding of the stereoscopic image authentication
message and tamper detection. In the watermark embedding process, the binocular just noticeable difference (BJND) model is used for guiding watermark embedding, which is convenient for achieving a
balanced relationship between watermarking capacity and visual transparency. In the tamper detection
process, a probability theory and an algorithm of binocular disparity are employed to improve previously
obtained detection results and to enhance authentication accuracy. Moreover, to improve the security of
the proposed scheme, MD5 hash function and chaotic map are used. Experimental results reveal that the
proposed scheme is not only secure, but also achieves superior tamper detection for different attacks.
2015 Published by Elsevier GmbH.
Q3
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
Q2
Corresponding author at: School of Information and Electronic Engineering, Zhejiang University of Science & Technology, Hangzhou 310023, China.
Tel.: +86 571 85070303.
E-mail address: [email protected] (W. Zhou).
http://dx.doi.org/10.1016/j.aeue.2015.10.006
1434-8411/ 2015 Published by Elsevier GmbH.
Please cite this article in press as: Zhou W, et al. Binocular visual characteristics based fragile watermarking scheme for tamper detection
in stereoscopic images. Int J Electron Commun (AE) (2015), http://dx.doi.org/10.1016/j.aeue.2015.10.006
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
G Model
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
AEUE 51503 18
ARTICLE IN PRESS
in the two views of a stereoscopic image match with binocular disparity, when the target image is tampered with, the left and right
views are often modied symmetrically with reasonable binocular
disparity; the inter-correlations in the modications, in such cases,
help improve the performance of tamper detection. This study aims
to integrate binocular visual characteristics and probability theory to improve image tamper detection accuracy and precision.
Further, MD5 hash function and chaotic map are employed for
improving the security of the proposed scheme. The effectiveness
of the proposed scheme is veried through a series of attacks.
The remainder of this paper is organized as follows. In Section
2, the proposed watermarking scheme, including the watermark
embedding and tamper extraction is explained. Experimental
results are presented in Section 3. Finally, conclusions are drawn in
Section 4.
bn (0, 1)
(1)
where n = 0, 1, . . . is the map iteration index and is a system parameter. If 3.5699456 < 4, then the logistic chaotic map
becomes chaotic. In this state, the sequence is non-periodic, nonconvergent, and very sensitive to the initial value of b0. Moreover,
all the orbits of the logistic map are dense in the range of the map
[0,1].
Step a2: An index ordered sequence A = a1 , . . ., ai , . . ., aN
such that ba ba ba
is obtained by sorting B =
133
134
135
136
137
138
139
140
141
142
143
144
147
148
149
150
151
152
153
132
146
131
145
bn+1 = bn (1 bn ),
130
b1 , b2 , . . ., bN .
Step a3: The index of the content pixel is set as p(m) and its corresponding mapping index of watermark inserting pixel as p(am ).
Step a4: All pairs of p(m) and p(am ) are recorded to form the
one-to-one pixel-mapping sequence.
Step a5: p(m) and p(am ) are reset to two dimension pixelmapping coordinates.
Please cite this article in press as: Zhou W, et al. Binocular visual characteristics based fragile watermarking scheme for tamper detection
in stereoscopic images. Int J Electron Commun (AE) (2015), http://dx.doi.org/10.1016/j.aeue.2015.10.006
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
G Model
ARTICLE IN PRESS
AEUE 51503 18
184
185
186
Ar (i, j + d)
Ac,limit (bgr (i, j + d), ehr (i, j + d))
1/
(2)
195
where d is the horizontal binocular disparity value at pixel coordinate (i,j), bgr (i,j + d) denotes the background luminance level,
Ar (i,j + d) denotes the noise amplitude, ehr (i,j + d) denotes the edge
height, and Ac,limit denotes the contrast masking threshold. Parameter controls the inuence of the noise in the right view and is
set to 1.25 (more details can be found in [26]). It should be noted
that BJNDl is dependent on the background luminance, the noise
amplitude, and the edge height of the corresponding pixel in the
right view. For a noise-free view, Ac,limit is dened by
196
187
188
189
190
191
192
193
194
197
if 0 bg < 8
if 48 bg 255
198
Alimit (bg) =
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
(3)
(4)
(5)
k(i, j) =
k max
BJNDl (i, j)
max(BJNDl (i, j)
min(BJNDl (i, j)
) min(BJNDl (i, j)
(6)
where kmax = 3 is the maximum number of LSBs, which will be discussed in Section 3, and max() and min() return the maximum
and minimum of the array, respectively. The symbol represents
the round up integer operation.
The watermarking capacity of the
left view is dened as Cw =
k(i, j). The watermarking capacity
i,j
calculation of the right view is the same as that for the left view.
Step b3: Then, employ the values of the residual view I rl (x, y)
and BJNDl (x,y), the pixel coordinates (x,y), the user ID, and the user
secret key k2 to produce a 128-bit hash value, through the following
MD5 hash function:
H(Ilr (x, y)||BJNDl (x, y)||x||y||ID||k2 )
= (d0 (x, y), d1 (x, y), . . ., d127 (x, y))
(7)
223
224
225
226
227
228
229
230
231
(132/k(i,j)
)1
232
i=0
(8)
Please cite this article in press as: Zhou W, et al. Binocular visual characteristics based fragile watermarking scheme for tamper detection
in stereoscopic images. Int J Electron Commun (AE) (2015), http://dx.doi.org/10.1016/j.aeue.2015.10.006
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
G Model
AEUE 51503 18
ARTICLE IN PRESS
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
(9)
n)) = 1, and if
algorithm. If FL (m, n) = 1, dene F R (m, n d(m,
297
298
(10)
299
(11)
290
291
292
293
294
295
296
300
301
302
k(i, j)
i=1
j=1
w =
(12)
MN
303
304
305
306
307
l2 = P(Ql (m, n) =
/ 0|FL (m, m) H1 ) = l1
T 1
i=0
i
Cbb
(l1 ) (1 l1 )
bbi
(13)
(14)
T 1
i
Cbb
(l2 ) (1 l2 )
bbi
(15)
308
309
310
311
312
313
314
315
316
i=0
For a given threshold T, Pfd (T) and Pfd (t) should satisfy the equation:
Pfd (T ) Pfd (t)
2.4. Threshold T
In this subsection, we will discuss how the threshold T is selected
using the theory of probability [27]. Tamper discrimination can be
formulated as a binary hypothesis test as follows: H0 : the tampered
content of the image pixel, H1 : the content of the image pixel that
is not tampered with. In order to determine a valid hypothesis,
Ql (m,n) is compared with a suitably selected threshold T. For a given
threshold T, the system performance can be measured in terms of
the probability of false acceptance Pfa (T) and the probability of false
rejection Pfr (T):
289
(16)
where Pfd (t) = Pfa (t) + Pfr (t) (1 ) when the threshold is t [0,
b b].
3. Experimental results
In this section, ve stereoscopic images of size 640 480 are
tested to assess the accuracy and effectiveness of the proposed
scheme, as illustrated in Fig. 4. Since watermarks are embedded
into the stereoscopic images through BJND guiding, the difference between original pixels and watermarked pixels are within
BJND allowable ranges and watermarked stereoscopic images are
imperceptible. The less LSB (the smaller parameter kmax ) are used
for embedding watermark, the higher visual quality of the watermarked stereoscopic image can be achieved. However, the smaller
parameter kmax is chosen, the less watermark capacity can be
obtained. In order to achieve a balanced relationship between
watermarking capacity and visual transparency, the parameter
kmax is set to 3 based on our experimental study.
Smooth and shallow depth stereoscopic images have low capacities, and the PSNR of the watermarked view is relatively higher;
for example, the left and right watermarked views of Newspaper
are 39.49 dB and 39.51 dB, respectively. On the contrary, a stereoscopic image with more texture and deeper depth can hide more
information, and the PSNR of the watermarked view is lower; for
example, the left and right watermarked views of Altmoabit are
37.66 dB and 37.77 dB, respectively. The parameters of logistic map
are chosen as = 3.845 and b0 = 0.654 (the same value as the one
used in [23]).
Please cite this article in press as: Zhou W, et al. Binocular visual characteristics based fragile watermarking scheme for tamper detection
in stereoscopic images. Int J Electron Commun (AE) (2015), http://dx.doi.org/10.1016/j.aeue.2015.10.006
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
G Model
ARTICLE IN PRESS
AEUE 51503 18
348
349
Rfa =
350
Rfr =
346
347
1 Ntd
100%
Nt
N fd
N Nt
100%
(18)
356
357
352
353
354
355
358
359
360
361
362
363
364
365
366
(17)
351
Fig. 4. Original stereoscopic images. (a) Balloons, (b) altmoabit, (c) doorower, (d) art, and (e) newspaper.
Please cite this article in press as: Zhou W, et al. Binocular visual characteristics based fragile watermarking scheme for tamper detection
in stereoscopic images. Int J Electron Commun (AE) (2015), http://dx.doi.org/10.1016/j.aeue.2015.10.006
367
368
369
370
371
372
373
374
375
376
377
378
379
380
G Model
AEUE 51503 18
ARTICLE IN PRESS
Fig. 5. Copy and paste attack. (a) The tampered stereoscopic image, (b) stage 1 detection, and (c) stage 2 detection.
Fig. 6. Text insertion tampering. (a) The tampered stereoscopic image, (b) stage 1 detection, and (c) stage 2 detection.
Fig. 7. Content removal tampering. (a) The tampered stereoscopic image, (b) stage 1 detection, and (c) stage 2 detection.
Please cite this article in press as: Zhou W, et al. Binocular visual characteristics based fragile watermarking scheme for tamper detection
in stereoscopic images. Int J Electron Commun (AE) (2015), http://dx.doi.org/10.1016/j.aeue.2015.10.006
G Model
ARTICLE IN PRESS
AEUE 51503 18
Fig. 8. Collage attack. (a) The tampered stereoscopic image, (b) stage 1 detection, and (c) stage 2 detection.
Fig. 9. Watermark removal tampering. (a) The tampered stereoscopic image, (b) stage 1 detection, (c) stage 2 detection, and (d) authentication result of Rawats scheme [22].
381
382
383
384
385
386
387
388
389
390
391
392
Table 1
Performance comparisons between the proposed scheme and Rawats scheme.
Schemes
Rawats scheme
Stage-1 authentication
Stage-2 authentication
Indicators
Rfa
Rfr
Rfa
Rfr
Rfa
Rfr
Tamper
Copy and paste tamper
Collage attack
50.72%
0.00%
18.66%
0.94%
8.42%
0.00%
45.32%
0.00%
5.37%
2.37%
0.36%
0.04%
49.08%
0.00%
37.61%
1.43%
14.49%
0.00%
50.36%
0.00%
51.56%
0.86%
28.84%
0.00%
Please cite this article in press as: Zhou W, et al. Binocular visual characteristics based fragile watermarking scheme for tamper detection
in stereoscopic images. Int J Electron Commun (AE) (2015), http://dx.doi.org/10.1016/j.aeue.2015.10.006
393
394
395
396
397
398
399
400
401
402
403
404
405
G Model
AEUE 51503 18
ARTICLE IN PRESS
409
410
4. Conclusion
406
407
408
429
In this paper, we have proposed an efcient fragile watermarking scheme for stereoscopic image authentication and locating
tampered regions. The main features of the scheme are summarized below: (1) the binocular just noticeable difference (BJND)
model helps guide watermark embedding without affecting perceptual quality, while also increasing watermarking capacity. (2)
MD5 hash function and chaotic map are employed in our scheme
to make the scheme highly secure. (3) Probability theory and
binocular disparity are used to improve image tamper detection accuracy and precision. Experimental results show that our
scheme achieves superior tamper detection and localization accuracy for different attacks; furthermore, it can distinguish between
content removal tampering and watermark removal tampering
attacks.
In future research, we plan to focus more on stereoscopic visual
saliency for fragile watermarking of stereoscopic images to achieve
a balanced relationship between watermarking capacity and visual
transparency, and also to improve the accuracy of tamper localization.
430
Acknowledgements
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
431
Q4
432
433
434
435
436
437
438
439
440
441
[4] Zhou WJ, Jiang GY, Luo T, Yu M, Shao F, Pneg ZJ. Stereoscopic image tamper
detection and self-recovery using hierarchical detection and stereoscopic
matching. J Electron Imaging 2014;23(2):023022.
[5] Lee MK, Bae KH, Kim JJ, Kim ES. New watermark scheme for copyright protection of the stereo vision system using adaptive disparity matching algorithm.
SPIE Proc Vis Inf Process XII 2003;5108:2109.
[6] Hwang DC, Bae KH, Lee MH, Kim ES. Real-time stereo image watermarking
using discrete cosine transform and adaptive disparity maps. SPIE Proc Multimed Syst Appl VI 2003;5241:23342.
[7] Hwang DC, Ko JH, Park JS, Kim ES. Stereo watermarking scheme based on discrete wavelet transform and feature-based window matching algorithm. Proc
SPIE 2004;5600:18291.
[8] Coltuc D, Caciul Ia, Coanda H. Color stereo embedding by reversible watermarking. IEEE Int Symp Electr Electron Eng (ISEEE) 2010:2569.
[9] Campisi P. Object-oriented stereo-image digital watermarking. J Electron Imaging 2008;17(4):043024.
[10] Chammem A, Mitrea M, Preteux F. DWT-based stereoscopic image watermarking. Proc SPIE 2011;7863:786326.
[11] Niu Y, Souidene W, Beghdadi A. A visual sensitivity model based stereo image
watermarking scheme. In: 3rd European Workshop on Visual Information
Processing (EUVIP). 2011. p. 2115.
[12] Yu M, Wu A, Luo T, Jiang G, Li F, Fu S. New block-relationships based stereo
image watermarking algorithm. In: ICSNC. 2011. p. 1714.
[13] Lin YH, Wu JL. A digital blind watermarking for depth-image-based rendering
3D images. IEEE Trans Broadcast 2011;57(2):60211.
[14] Kim HD, Lee JW, Oh TW, Lee HK. Robust DT-CWT watermarking for DIBR 3D
Images. IEEE Trans Broadcast 2012;58(4):53343.
[15] Walton S. Information authentication for a slippery new age. Dr Dobbs J
1995;20(4):1826.
[16] Suthaharan S. Fragile image watermarking using a gradient image for improved
localization and security. Pattern Recogn Lett 2004;25(16):1893903.
[17] He H, Zhang J, Chen F. Adjacent-block based statistical detection
method for self-embedding watermarking techniques. Signal Process
2008;89(8):155766.
[18] Chuang J, Hu Y. An adaptive image authentication scheme for vector quantization compressed image. J Vis Commun Image Represent 2011;22(5):4409.
[19] Gao G. Composite chaos-based lossless image authentication and tamper localization. Multimed Tools Appl 2013;63(3):94764.
[20] Zhang X, Wang S. Statistical fragile watermarking capable of locating individual
tampered pixels. IEEE Signal Process Lett 2007;14(10):72730.
[21] Hsu CS, Tu SF. Probability-based tampering detection scheme for digital images.
Opt Commun 2010;283(9):173743.
[22] Rawat S, Raman B. A chaotic system based fragile watermarking scheme for
image tamper detection. AEU Int J Electron Commun 2011;65(10):8407.
[23] Teng L, Wang X. Cryptanalysis and improvement of a chaotic system based
fragile watermarking scheme. AEU Int J Electron Commun 2013;67(6):5407.
[24] Zhang X, Wang S. Fragile watermarking scheme using a hierarchical mechanism. Signal Process 2009;89(4):6759.
[25] Kanso A, Smaoui N. Logistic chaotic maps for binary numbers generations.
Chaos Solitons Fractals 2009;40(5):255768.
[26] Zhao Y, Chen Z, Zhu C, Tan YP, Yu L. Binocular just-noticeable-difference model
for stereoscopic images. IEEE Signal Process Lett 2011;18(1):1922.
[27] He HJ, Zhang JS, Tai HM. A wavelet-based fragile watermarking scheme for
secure image authentication. Lect Notes Comput Sci 2006;4283:42232.
Please cite this article in press as: Zhou W, et al. Binocular visual characteristics based fragile watermarking scheme for tamper detection
in stereoscopic images. Int J Electron Commun (AE) (2015), http://dx.doi.org/10.1016/j.aeue.2015.10.006
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495