Next Article in Journal
Optimal Transshipment Route Planning Method Based on Deep Learning for Multimodal Transport Scenarios
Previous Article in Journal
Integrated Circuit Design of Fractional-Order Chaotic Systems Optimized by Metaheuristics
Previous Article in Special Issue
A High-Capacity Coverless Information Hiding Based on the Lowest and Highest Image Fragments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ

1
Department of Computer Science and Information Engineering, National Chin-Yi University of Technology, Taichung 41170, Taiwan
2
Department of Asia-Pacific Industrial and Business Management, National University of Kaohsiung, Kaohsiung 811, Taiwan
3
Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung City 404, Taiwan
4
Department of Computer Science and Engineering, National Chung Hsing University, Taichung City 40227, Taiwan
5
Institute of Information Management, National Yang Ming Chiao Tung University, Taipei 10650, Taiwan
*
Authors to whom correspondence should be addressed.
Electronics 2023, 12(2), 415; https://doi.org/10.3390/electronics12020415
Submission received: 13 November 2022 / Revised: 25 December 2022 / Accepted: 26 December 2022 / Published: 13 January 2023
(This article belongs to the Special Issue Recent Developments and Applications of Image Watermarking)

Abstract

:
Digital images have unique features that include being both easily transmittable over the Internet and being easy to tamper. With the advancement of digital processing techniques and an increasing number of valuable digital images being transmitted via the Internet, image authentication has been made more crucial than ever. In this paper, we present an image authentication scheme with tamper localization and self-recovery using fragile watermarking. We embed the fragile watermarks consisting of the authentication code and the recovery information onto the image to verify its integrity. The proposed fragile watermarking scheme can authenticate the image without accessing the original image, localizing the modifications as well as verifying the integrity, and even reconstructing the tampered regions. We use an AMBTC compressed code as the authentication code to minimize the distortion introduced by embedding. To reduce the blocking effect that occurs in the reconstructed image, a VQ compressed code is applied instead of the average intensity as the recovery information. Several representative test images and 200 different test images were randomly selected from BOWS to examine the performance of the proposed scheme. Experimental results confirm that the proposed scheme can effectively resist a cutting attack and a copy-paste attack while retaining the high accuracy of tamper localization. The average TPR and average FTP rate were around 97% and 0.12%, respectively, while maintaining the image quality of the watermarked image and restoring the image at up to 48 dB and 39.28 dB, respectively.

1. Introduction

Digital images that are easy to edit, modify, and exploit can be widely shared and distributed via the Internet. Thanks to powerful image processing techniques, it is increasingly easier for everyone to perfectly edit digital images and create forgeries. Creating perfect forgeries can lead to the theft and misuse of intellectual property. Proving the origin of an image and its integrity is thus essential for an image owner. As a result, image authentication and integrity verification have become important issues in recent years.
In general, the authenticity of digital images can be guaranteed by using digital signatures. Digital signatures employ asymmetric cryptography to establish the authenticity and integrity of a digital image by attaching a hash of the image. One possible drawback of digital signatures is the fact that extra bandwidth is required to transmit the signatures. Moreover, authentication based on digital signatures cannot localize changes nor reconstruct tampered regions in the image, even if integrity protection is provided.
To address the above problem, fragile watermarking schemes have been proposed as a means of verifying image integrity [1]. The visual redundancy of digital images makes it possible to embed invisible fragile watermarks into such images without modifying the essential features of the images. To further enhance the function of fragile watermarking schemes, researchers have designed self-embedding methods, such as that of a fragile watermark concurrently consisting of an authentication code and recovery information. With the hidden authentication code and recovery information, the modifications made to the watermarked image are expected to be localized, and tampered regions can later be restored. Different from robust watermarks, for both fragile watermarking and self-embedding fragile watermarking, embedded watermarks can be easily compromised by any kind of malicious attack [1,2,3]. In other words, any attempt to alter the image content will also alter the embedded fragile watermark itself, which is thus capable of detecting every change that has occurred to the image [4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22].
In 2011, Lee et al. designed a hierarchical fragile watermark based on VQ index recovery [5]. In their scheme, with the hierarchical strategy and LSB substitution, the average image quality of the watermarked image was around 39.6 dB. In the next year, He et al. [6] presented a self-recovery fragile watermarking scheme using block-neighborhood tamper characterization. They generated nonlinear block mapping to embed the watermark and used an optimized neighborhood characterization method to detect tampering. In the next year, Zhang et al. [7] proposed a self-embedding fragile watermarking scheme. In their scheme, they first generated DCT coefficients for each 2 × 2 block. Next, they embedded the generated fragile watermark into another block according to the block mapping. The experiments confirm that the average PSNR of the watermarked images is around 42.6 dB, and the tampered regions can be successfully localized and exactly recovered for content-only tampering.
In 2014, Lin et al. [8] proposed a high-quality image authentication scheme based on absolute moment block truncation coding (AMBTC). They used the parity of the bitmap to generate the authentication code for authenticating each compressed image block. The proposed hierarchical inspection structure was effective in resisting a collage attack. Unfortunately, Lin et al.’s scheme did not offer a recovery feature. In the same year, Yang et al. designed a fragile watermarking with a recovery function for halftone images [9]. In the next year, Sarreshtedari and M. A. Akhaee [10] compressed the whole image as recovery data and encoded it as a watermark by using Reed-Solomon codes (RS codes). The tampered regions can be restored by the error-correcting RS code. However, they cannot restore more than 𝑛-𝑘 erasures when using the RS(𝑛, 𝑘) code. In 2015, Li et al. designed a reference matrix-based watermark embedding strategy to conceal authentication codes into quantization levels of the compressed images generated by the block truncation coding (BTC) [11]. In 2016, Qin et al. [12] designed self-embedding watermarking based on a reference-data interleaving mechanism and adaptive selection of the embedding mode. In their scheme, the binary bits in the adopted MSB layers are scrambled and individually interleaved with different extension ratios and are then combined with authentication bits to form the watermark bits for LSB embedding. In Qin et al.’s scheme, the average image quality of the recovered image remained at 45.42 dB when the tamper rate was around 12%. In 2017, Cao et al. [13] proposed a self-embedding fragile image watermarking scheme for tamper recovery. They also adopted MSB layers and LSB layers, but they applied a hierarchical recovery mechanism in their scheme. According to the contribution of the image quality, the binary bits in the MSB layers were first scrambled and then individually interleaved with different extension ratios. Later, the interleaved data served as recovery information and were embedded into LSB layers of non-overlapping blocks along with the authentication code. Even with the hierarchical recovery mechanism, the average image quality of the restored images was not significantly improved compared to Qin et al. [12]. In the same year, Qin et al. designed a VQ-based self-embedding fragile watermarking [14]. In their scheme, VQ indices derived from the original image served as recovery information. Later, hash values were computed from the combination of VQ indices, and the original image was computed and embedded into the image itself via LSB substitution. Different from Qin et al. [14], Lin et al. designed a hybrid watermark hiding strategy for compressed images generated by [15]. Although their scheme did not provide a recovery function, the image quality of the watermarked images had been significantly improved compared with existing schemes.
In 2018, Tai and Liao [16] embedded the fragile watermark of one block into another block according to the embedding sequence generated by a chaotic map. To reduce the smooth blocking effect of the recovered images, they used a wavelet transform rather than the average as the recovery data to enhance the image contrast. This method can effectively resist a collage attack and constant-average attack. Hong et al. [17] proposed an efficient authentication scheme for AMBTC compressed images. They protected the AMBTC codes by embedding the authentication codes into the least significant bits (LSBs) of two quantization levels to minimize the embedding distortion. In 2019, Chen et al. [18] proposed a novel authentication scheme for the AMBTC of a compressed image using turtle-shell-based data hiding. Previous AMBTC-based schemes have the problem of having a high quantization level, which is lower or equal to a low quantization level caused by the hiding operation. Thus, they proposed an iterative embedding mechanism to solve the above issues and achieved high tamper detection accuracy. Su et al. [19] presented an authentication scheme based on the matrix encoding for AMBTC-compressed images. The six-bit authentication code was embedded into two sub-bitmaps using matrix encoding. Their scheme offered an improved detection rate in the first hierarchical tampering detection. In 2020, Roy et al. [20] designed a copyright protection mechanism with digital image watermarking. In their scheme, adaptive LSB replacement was adopted to embed the watermark. Moreover, to enhance the robustness of the hidden watermark, the higher bit-planes were also modified instead of only the LSB. In 2021, Hong et al. [21] further improved the visual qualities of marked and recovered images by using matrix encoding and side match techniques. In the same year, Chang et al. used AMBTC compression results to first generate a watermark. Later, they applied the turtle shell data hiding method to conceal the watermark in the original image [22]. Lin et al. [23] presented a pixel pair-wise fragile image watermarking method. They used AMBTC to generate the authentication code and recovery information as watermarks. To reduce overhead information, the bitmap generated by AMBTC was further compressed by Huffman coding.
Although many self-embedding fragile watermarking schemes have been proposed in the last six years, it continues to be a challenge to enhance the tamper detection capacity and image quality of the restored images while maintaining an acceptable visual quality in the watermarked images. In particular, an increasing number of valuable digital images are being transmitted via the Internet and shared through social media platforms. Neither individual users nor companies are willing to compromise the quality of their personal images or digital image productions when they try to adopt integrity protection mechanisms. Thus, in this paper, we present a fragile watermarking scheme as an image assurance tool for integrity protection with tamper localization and self-recovery. Tamper detection performance is related to the size of the hidden authentication code, and recovery performance is related to the size of the recovery information and the correlation between the recovery information and the original image. However, the larger the amount of the hidden authentication code and recovery information, the lower the image quality of the watermarked image is. To maintain the tradeoff between the performance of tamper detection and recovery, and the image quality of the watermarked image, AMBTC compressed codes derived from the original image are used as the authentication code that can detect every possible change that has occurred in an image with a very high probability. To allow the tampered regions of the image to be partially repaired, we utilized vector quantization (VQ) compressed codes as the recovery information. The contributions of this paper are summarized as follows:
  • A novel fragile watermarking combining an AMBTC compression method is designed to enhance tamper detection performance. Using the AMBTC compression codes to generate authentication codes, the average TPR, and average FTP rate are around 97% and 0.12%, respectively, which outperforms other existing schemes.
  • Utilizing VQ indices as the recovery information, the image quality of the restored image ranges from 31.26 dB to 46.05 dB. Even in the worst case, the PSNR is still above 30 dB.
  • With the increased concealment of the authentication codes, our scheme provides better tamper detection performance against a copy-paste attack and cutting attack where different tamper ratios are encountered.
  • The experimental results confirm that the proposed fragile watermarking scheme exceeds the performance of most existing work with respect to balancing tamper detection and the image quality of watermarked images and restored images.
Section 2 reviews the basic concepts of AMBTC and VQ that are needed for the fragile watermarking scheme. Section 3 explains the proposed watermarking scheme, including the embedding, detection, and self-recovery algorithms. Experimental results and their analysis appear in Section 4. Finally, the paper is concluded in Section 5.

2. Related Work

This section reviews two image compression techniques that are necessary to generate the proposed fragile watermark. The first is AMBTC which is used to generate the authentication code, while the second technique is VQ, which is used to generate the recovery information.

2.1. AMBTC

Absolute moment block truncation coding (AMBTC) [24] is based on the idea of block truncation coding, whereas it is simpler in the implementation. The pixels in each block, which are quantized into two-level outputs, make the mean value, and the first absolute central moment is preserved in the reconstructed block. AMBTC preserves absolute moments rather than standard moments, resulting in a lower mean squared error (MSE) with the bit rate as low as 2 bpp (bit per pixel).
The image is divided into blocks of 4 × 4 pixels. The mean value x ¯ of each block x, taken as the one-bit quantizer threshold, is computed as:
x ¯ = 1 16 i = 1 16 x i
where xi is the ith pixel in the block. A bitmap BM is used to record the thresholding result, which is generated as:
b m i = { 0 1 if x i < x ¯ otherwise
where bmi is the ith bit in the bitmap. Two-level quantization outputs are computed from:
x ¯ L = 1 16 q x i < x ¯ x i
x ¯ H = 1 q x i x ¯ x i
where q is the number of pixels whose values are larger than the mean value, x ¯ L and x ¯ H denotes the lower and higher means of the block, respectively. As a result, each block is encoded as a triple ( x ¯ L , x ¯ H , BM). For AMBTC decoding, each pixel x’i in the block can be reconstructed as:
x i = { x ¯ L x ¯ H if b m i = 0 otherwise .
An example demonstrating AMBTC compression is shown in Figure 1. Figure 1a shows an original image with a block sized 4 × 4 pixels, and its corresponding bitmap can be derived based on Equation (2) when the average value of the original image block is computed. According to the bitmap shown in Figure 1b, two quantization levels for the two groups are calculated by Equations (3) and (4). Finally, the restored image block can be constructed based on two quantization levels and a bitmap.

2.2. Vector Quantization

Vector quantization (VQ) [25] is a classical quantization method that can be used for image compression. It divides a large set of vectors into groups that have similar vectors using clustering algorithms. Each group is represented by its centroid vector. VQ encodes a vector as the index of its closest centroid and is thus capable of achieving image compression with a low error and bit rate. VQ has been successfully used in a vector-quantized variational autoencoder (VQ-VAE) for the high-quality and large-scale generation of images.
VQ maps k-dimensional vectors in the vector space Rk into a finite set of vectors as Y = {y0, y1, …, yn−1} and k = w × h, where h is the height of a block and w is the width of a bock. The vector yi is called a codeword, and the set of all the codewords Y is called a codebook, as shown in Figure 2. Given an input vector, the encoder determines the representative codeword yi that is the closest in Euclidean distance from it and, thus, encodes the input vector as the index i of the codeword yi. At the decoder, this index i is used to lookup the codeword yi from the same codebook Y to reconstruct the vector. Note that the performance of VQ is mostly influenced by the elements of the codebook. Theoretically, VQ can be useful in cases when the decoder has limited information and a fast execution time is required.

3. Proposed Method

We propose a fragile watermarking scheme for image authentication with the capabilities of tamper localization and self-recovery. A fragile watermark consisting of an authentication code and recovery information is self-embedded in the image making, thus, is capable of authenticating itself without accessing the original image. To further improve tamper detection performance and recovery performance while not causing significant distortion to the original image, the AMBTC compression codes and VQ indices derived from the original image are served as the authentication code and recovery information, respectively. Note that a general codebook is adopted in our scheme during the generation of VQ indices instead of a unique and pre-trained codebook to eliminate extra transmission costs for sharing the VQ codebook. A detailed description of watermark generation and embedding, and authentication/recovery, are given in Section 3.1 and Section 3.2, respectively.

3.1. Watermark Generation and Embedding

The process of the watermark generation and embedding is illustrated in Figure 3. We assume that the original image is an 8-bit grayscale digital image of n pixels, where all possible pixel values are integers in the range [0, 255]. The original image is divided into non-overlapping blocks of 4 × 4 pixels. For each block, we generated an 8-bit authentication code derived from its corresponding AMBTC compression code that would be used to detect any modification made to the image. To generate the AMBTC compression codes for a given image, we first used a random seed γ to generate a random bit stream of length 4n bits and then used the bit stream to substitute 4 LSBs of the original image to obtain the preprocessed image. For each block of 4 × 4 pixels in the preprocessed image, we computed the triple ( x ¯ L , x ¯ H , BM) by AMBTC and generated the 8-bit authentication code AC as:
AC = H ( BM )   | |   H ( x ¯ H | | x ¯ L ) ,
where H(.) is a 4-bit hash function. H(BM) indicates the 4-bit hash value derived from the bitmap, BM. H ( x ¯ H || x ¯ L ) indicates the 4-bit hash value derived from the two quantizers. The recovery information RI of each block is generated by VQ encoding of the original image with a codebook size of 256.
To make the authentication with tamper localization and self-recovery possible, for each block, we embedded an authentication code AC into it for tamper localization while embedding the recovery information RI for image recovery. It was necessary to break the block-wise independency to resist malicious attacks. Here, we used random seeds γ1 and γ2 to generate two non-repeating sequences, Map1 and Map2, respectively, for watermark generation. To enhance the tamper detection performance of the hidden authentication code and ensure that the tampered regions could be restored by their recovery information, the AC and RI for a given block were not directly embedded into its block. Instead, RI was separated into two parts, and embedded into two different blocks according to Map1 and Map2, as shown in Figure 4. For each block, we embedded a 24-bit fragile watermark msg composed of the AC and RI1 of its mapping block selected from Map1 and the RI2 of the other mapping block selected from Map2 into it, which could be further divided into eight 3-bit watermarks as:
msg = {AC, RI1, RI2} = {msg1, …, msg8},
where msgi = {ACi, RI1i, RI2i}.
The watermark embedding operation was then designed so that a 3-bit watermark msgi could be assigned to a pair of pixels. We further propose a binary digital table (BD) and waves type table (WT) to modify the pair of pixel values to meet their assigned watermark msgi. Figure 5 shows the binary digital table BD, which is defined as:
BDx, y = (x + y) mod 2,
where BDx, y is the binary value at the position (x, y). The waves type table WT is illustrated in Figure 6 and is computed by:
W T x , y = ( x + y / 2 ) mod 4 ,
where WTx, y is the table value at the position (x, y). To see how to embed a 3-bit watermark msgi in a pair of pixels, let us read the next two pixels, P1 and P2, of a block as a pair in raster order. The 4 LSBs of the pair are used to generate the coordinate (x, y) = (P1 mod 16, P2 mod 16). From matrix BD and matrix WT, we found the coordinate (x’, y’) in the clockwise direction from (x, y) such that BDx’, y’ = ACi and WTx’, y’ = 2 × RI1i + RI2i. The embedded pair of pixels (P1′, P2′) was then computed by:
{ P 1 = 16 × P 1 / 16 + x P 2 = 16 × P 2 / 16 + y
Although the mapping operations are complex, its idea is quite straightforward. Our objective is that pixels in a block only require slight modifications so that the modified pixel pair’s coordinate can map to its corresponding AC and RI via matrices BD and WT. In other words, to carry the 24-bit hidden watermark, we divided it into eight segments, and each segment contained only a 3-bit watermark called msgi, where 1 i 8 for an embedding block sized 4 × 4. Two pixels in an embedding block form a pixel pair, and two transformations are defined in Equations (8) and (9). With these two transformation functions, the corresponding 3-bit watermark can generate two different values when mapped to matrices BD and WT, respectively, as shown in Figure 5 and Figure 6, respectively.
Once both matrices BD and TW were generated, two matrices were stacked together, as shown in Figure 7. In Figure 7, the numbers in red present matrix BD, and the numbers in black present matrix WT. Subsequently, the only thing that needs to be conducted is to find a pixel pair (P1′, P2′) that is very similar to the original pixel pair and its coordinate maps to the values derived by Equations (8) and (9) in matrices BD and TW, respectively. To give a clear explanation, we will show an example of how the watermark embedding runs. Let the 24-bit watermark msg embedded in the block be {01110001, 00101011, 10000111}. Assume that we embedded the 3-bit watermark msg2 = {AC2, RI12, RI22} = {1, 0, 0} in the second pair of the two pixels P3 = 229 and P4 = 225. The coordinate (x, y) is computed as (P3 mod 16, P4 mod 16) = (5, 1). From Figure 5, we find the coordinate (4, 1) in the clockwise direction from (5, 1) such that BD4, 1 = AC2 = 1 and WT4, 1 = 2 × RI12 + RI22 = 0. As a result, the embedded pair of pixels (P3′, P4′) is = (228, 225).

3.2. Authentication and Recovery

The proposed fragile watermarking scheme provides authentication with tamper localization and self-recovery in the sense that if the image is deemed inauthentic, the regions of the image that have been tampered with can be localized and even reconstructed. The process of authentication and recovery is presented in Figure 8. We first calculate the authentication code AC org ¯ for each block by using Equation (6) with the random seed γ from the preprocessing image, as described in Section 3.1. To extract a 3-bit watermark msgi from a pair of pixels, let us read the next two pixels, P1′ and P2′, of a block as a pair in raster order. We compute the coordinate (x, y) as (P1′ mod 16, P2′ mod 16) and then obtain ACi = BDx,y, RI1i = WTx, y/2, and RI2i = WTx, y mod 2. For each block, the embedded msg1, msg2, …, msg8 are extracted to form the 24-bit watermark msg = { AC ext ¯ , RI 1 exr ¯ , RI 2 ext ¯ }.
The random seeds γ1 and γ2 are used to generate two non-repeating sequences: Map1 and Map2, respectively. For each block, we compare AC org ¯ with AC ext ¯ of its mapping block selected from Map1; if they are not equal, we mark it as invalid. To refine the tamper detection result, we took into account the block’s surroundings. After the first round of tamper detection, we further marked the central block as invalid in these cases, as shown in Figure 9.
In Figure 9, “x” indicates the current block is determined as “invalid.” “o” indicates the current block is determined as “valid.” A 3 × 3 mask shown in Figure 9 is used to judge whether the central block should be corrected as “invalid” by referring to its neighboring blocks. After tamper localization, we had to reconstruct the blocks that were marked as invalid. If the block was marked as invalid, we used RI 1 exr ¯ of its mapping valid block selected from Map1 as the index of the VQ codebook to lookup the codeword to reconstruct it. If the mapping block selected from Map1 was invalid, we used RI 2 ext ¯ of the mapping block selected from Map2 as the index of the VQ codebook to lookup the codeword to reconstruct the invalid block.

4. Experimental Results

A series of simulations were conducted to measure the performance of the proposed scheme in tamper localization and recovery. Note that we focus on a cutting attack and copy-paste attack. Four grayscale images, Lena, Elaine, Baboon, and Airplane, of 512 × 512 pixels, are shown in Figure 10 and were used to simulate the attacks. We also present a performance comparison with Lin et al.’s AMBTC-based scheme [23] in this section because Lin et al. designed a fragile watermarking mechanism based on AMBTC’s features for the same spatial domain as ours. To further test the performance of our proposed scheme on tamper detection and recovery, 200 different test images were randomly selected from BOWS [26].

4.1. Attack Simulations

Two kinds of cutting attacks were simulated to test the performance of tamper localization and recovery. Figure 11 and Figure 12 give the visual performance under the cutting attacks for Airplane and Barbara, respectively. The tampering rates α are set to be 2.04% and 0.74% for cutting attack 1 and cutting attack 2, respectively. We can detect general tampering; however, we can also detect some false detected blocks and also have some blocks of false acceptance. This is intuitively clear because the attacked blocks whose mapping block falls into the collaged region are not detected. We note that the tampering detection result has a large influence on recovery performance.
We further simulated two kinds of copy-paste attacks to measure the detection and recovery performance. The copy-paste attack copies the image blocks from one authenticated image and then inserts them into arbitrary positions in the watermarked image. Figure 13 and Figure 14 show the visual performance under copy-paste attacks for Airplane and Barbara, respectively. The tampering rates α are set to be 4.53% and 1.84% for copy-paste attack 1 and copy-paste attack 2, respectively. The simulation results show that the regions tampered with by the copy-paste attack can be sufficiently detected and recovered.

4.2. Tamper Localization and Recovery Analysis

To measure the performance of tamper localization, we used true positive (TP), true negative (TN), false positive (FP), false negative (FN), true positive rate (TPR), and false positive rate (FPR) as quantitative measures. We also used a peak signal-to-noise ratio (PSNR) to quantify the reconstruction quality of the images. PSNR is calculated by summing up the squared differences between the evaluated image and the original image:
PSNR = 10 log 10 255 2 1 M × N i = 0 M j = 0 N ( W ( i , j ) O ( i , j ) ) 2
where W(i, j) and O(i, j) denote the pixel values at location (i, j) and M × N is the image size.
Table 1 and Table 2 give the tamper localization and recovery analysis against cutting attack 1 and cutting attack 2, respectively. Table 3 and Table 4 show the tamper localization and recovery analysis against copy-paste attack 1 and copy-paste attack 2, respectively. Note that a high TPR essentially means a high probability that an actual positive will test positive, whereas FPR is the proportion of negative cases incorrectly detected as positive cases. Our proposed scheme achieves a high TPR and an acceptable FPR in the sense that most tampered regions can be identified, although a few blocks are incorrectly detected. Although most tampered regions can be correctly detected, it is clearly desirable to recover as much of the visual content of the original image as possible. It is inevitable that this will fail to recover the tampered block when the block and its mapping block are both tampered with by attacks. In Table 1, Table 2, Table 3 and Table 4, our scheme introduces much less visible distortion into the image and, thus, has a high visual quality for the watermarked image and recovered image.
It is noted that in Table 1, Table 2, Table 3 and Table 4, data listed in the “watermarked” column show the image quality after concealing both the authentication code and recovery information. Therefore, the data listed in the “watermarked” column are the same. This is because no attacks occurred at this stage; the authentication codes are derived from the original image, and the recovery information is also derived from the original image. As for the data listed in the “Recovered” column, since attack types are different, the PSNRs listed in the “Recovered” column are similar but not the same.
To further evaluate our performance for tamper detection and recovery, 50 different images were randomly selected from the representative database BOWS [26] and used in two sets of experiments. In Figure 15 and Figure 16, the PSNRs of the watermarked images and recovered images against cutting attack 1 and copy-past attack 2, respectively, are presented. Since each figure presents 50 different images randomly selected from the BOWS database BOWS, there are 100 different images that were examined. From these two figures, our double matrix encoding strategy worked well, such that the PSNRs of 100 different watermarked images are very consistent and are close to 50 dB. For copy-past attack 2, the corresponding image quality of the restored images is almost higher than 40 dB.
To demonstrate the performance of our scheme on tamper detection and recovery against four types of attacks, 200 different images were randomly selected from the BOWS database [26] and then divided into four sets and tested through four types of attacks, as shown in Figure 9 and Figure 12, respectively. The related comparisons are listed in Table 5. From Table 5, the average TPR is around 96.09%, but the average FPR is about 0.03%. It is confirmed that the hidden authentication codes derived from the AMBTC compression codes successfully enhanced our tamper detection performance. For attack 2a, which is copy-paste attack 1, due to the relatively larger attack area, the image quality of the restored image is less than others.
Table 6 shows that the image quality of the restored images is related to the tamper ratio. However, even in the worst case, the restored images remain at 31.26 dB on average. Considering that Lin et al.’s AMBTC-based fragile watermarking [23] is the latest work that is based on AMBTC, the comparisons of the performance on tamper detection and recovery between Lin et al.’s AMBTC-based fragile scheme [23] and ours are demonstrated in Table 7. The recovered images from our scheme are also depicted in Figure 17. Comparing them with the originals shown in Figure 8, the recovered images are the same from the perspective of human visualization.
Based on the above data, listed in Table 7, we can see that Lin et al.’s scheme [23] has a lower TPR and higher FPR than our scheme, which indicates that their scheme has a higher probability of incorrectly detecting tampered regions. A possible drawback of Lin’s scheme is the fact that some blocks are deemed authentic, whereas it is actually tampered with by attacks, or some valid blocks are detected as invalid. Lin’s scheme also shows a larger distortion in the watermarked image and recovered image, introducing easily detectable artifacts. Our scheme can effectively detect the tampered blocks with a high TPR and a low FPR under the cutting attack and the copy-paste attack.
To further demonstrate the image quality of the watermarked image and restored image under the maximum tolerable tampering rate, Table 8 shows comparisons of theoretical values for the proposed scheme and eleven existing schemes [3,7,9,12,13,14,15,20,21,22,23] with four representative test images shown in Figure 10. In Table 8, the column “PSNR of recovered image” indicates the average image quality of the recovered results from the tampered images. The column “Condition of recovery” demonstrates the conditions for successful recovery in all the schemes, i.e., maximum tolerable tampering rates. Overall, the highest image quality of the watermarked images offered by our scheme cannot compete with that offered by Yang et al.’s scheme [9], but our restored image quality and tolerable tampering rate are relatively higher than Yang et al.’s scheme. The maximum tolerable tampering rates of [8,15] are less than 30%, which means that the restored image failed to be restored when the tampering rate was up to 30%. As for the remaining schemes, our proposed scheme is included, and the maximal tampering rate can be close to 50% or even close to 59%, as was Zhang et al.’s scheme [3]. Therefore, based on the experimental data listed in Table 7, our proposed scheme makes progress at the tradeoff between the image quality of a watermarked image, restored image, and maximal tampering rate by combining VQ and AMBTC.
Considering that there are multiple fragile watermarking schemes based on BTC/AMBTC or VQ, which are combined and adopted in our scheme, we present a comparison between these existing schemes and ours in Table 9. It can be noted that the PSNRs of the watermarked image listed in Table 9 are directly cited from the corresponding works with four representative test images shown in Figure 10.
Based on the above comparisons, we can see that most AMBTC/BTC-based fragile schemes are designed for AMBTC/BTC compressed images, and only Qin et al. [11], Chang et al. [21], Lin et al. [22], and our scheme were designed for spatial images and the features derived from AMBTC or BTC compression codes are utilized as an authentication code. Although Chang et al. [21] had the highest image quality for a watermarked image at 49.76 dB, our scheme has the second-highest PSNR at 48.21 dB. However, the average PSNR of the restored image with Chang et al.’s scheme [21] is only 34.65 dB, which is relatively lower than ours. Combining Table 8 and Table 9, only Roy et al.’s scheme [19] is a robust watermarking scheme, and they tested five different attacks to prove robustness. Among the remaining fragile watermarking schemes, our scheme not only tests against the cutting attack but also a copy-paste attack which is also called a collage. With AMBTC compression codes serving as the authentication code in our scheme, the number of authentication bits is larger than other methods, and accordingly, our average TPR rate is more than 97% with 200 different test images randomly selected from BOWS while maintaining a 0.12% FPR.

5. Conclusions

In this paper, we proposed an authentication technique with the capabilities of tamper localization and self-recovery by combining VQ and AMBTC. To improve tamper detection capability AMBTC compressed codes were applied as the authentication code. Additionally, with VQ indices derived from the original image, VQ serves as the recovery information for the tampered regions. Since the number of hidden authentication bits is relatively larger than other existing schemes, to reduce the distortion caused during the concealment of the authentication code and recovery information, a double matrix encoding method was proposed to minimize the introduction of obvious artifacts. Experimental results based on certain representative test images, or 200 test images randomly selected from BOWS confirmed that the proposed scheme could effectively resist a cutting attack and a copy-paste attack while retaining high accuracy for tamper localization. The average TPR and average FTP rate were around 97% and 0.12%, respectively, indicating that the general tamper detection performance is confirmed while maintaining the image quality of the watermarked image and restored image at up to 48 dB and 39.28 dB, respectively. The experimental results also show that there is room to improve the image quality of the restored images. Therefore, in future work, we will seek either other VQ variants or other techniques to further improve recovery performance.

Author Contributions

Conceptualization and methodology, C.-C.L. and P.-F.S.; software, P.-F.S. and B.Z.; validation, Y.-F.C., T.-L.L. and C.-C.L.; writing—original draft preparation, P.-F.S., Y.-F.C. and B.Z.; writing—review and editing, C.-C.L. and T.-L.L. Funding Acquisition, C.-C.L. and Y.-F.C. All authors have read and agreed to the published version of the manuscript.

Funding

National Science and Technology Council Taiwan, MOST 111-2221-E-025 -007; MOST 110-2410-H-167 -004.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Fridrich, J.; Goljan, M.; Memon, N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. J. Electron. Imaging 2002, 11, 262–274. [Google Scholar]
  2. Chang, C.C.; Fan, Y.H.; Tai, W.L. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognit. 2008, 41, 654–661. [Google Scholar] [CrossRef]
  3. Zhang, X.; Wang, S.; Feng, G. Fragile watermarking scheme with extensive content restoration capability. In International Workshop on Digital Watermarking; Springer: Berlin/Heidelberg, Germany, 2009; pp. 268–278. [Google Scholar]
  4. Zhang, X.; Wang, S.; Qian, Z.; Feng, G. Reference Sharing Mechanism for Watermark Self-Embedding. IEEE Trans. Image Process. 2011, 20, 485–495. [Google Scholar] [CrossRef]
  5. Lee, C.F.; Chen, K.N.; Chang, C.C.; Tsai, M.C. A Hierarchical Fragile Watermarking with VQ Index Recovery. J. Multimed. 2011, 6, 277–283. [Google Scholar] [CrossRef]
  6. He, H.; Chen, F.; Tai, H.; Kalker, T.; Zhang, J. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans. Inf. Forensics Secur. 2012, 7, 185–196. [Google Scholar] [CrossRef]
  7. Zhang, J.; Zhang, Q.; Lv, H. A novel image tamper localization and recovery algorithm based on watermarking technology. Optik 2013, 124, 6367–6371. [Google Scholar] [CrossRef]
  8. Lin, C.C.; Huang, Y.H.; Tai, W.L. A high-quality image authentication scheme for AMBTC-compressed images. KSII Trans. Internet Inf. Syst. 2014, 8, 4588–4603. [Google Scholar]
  9. Yang, S.; Qin, C.; Qian, Z.; Xu, B. Tampering detection and content recovery for digital images using halftone mechanism. In Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, 27–29 August 2014; pp. 130–133. [Google Scholar]
  10. Sarreshtedari, S.; Akhaee, M.A. A source-channel coding approach to digital image protection and self-recovery. IEEE Trans. Image Process. 2015, 24, 2266–2277. [Google Scholar] [CrossRef]
  11. Li, W.; Lin, C.-C.; Pan, J.-S. Novel image authentication scheme with fine image quality for BTC-based compressed images. Multimed. Tools Appl. 2015, 75, 4771–4793. [Google Scholar] [CrossRef]
  12. Qin, C.; Wang, H.; Zhang, X.; Sun, X. Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf. Sci. 2016, 373, 233–250. [Google Scholar] [CrossRef]
  13. Cao, F.; An, B.; Wang, J.; Ye, D.; Wang, H. Hierarchical recovery for tampered images based on watermark self-embedding. Displays 2017, 46, 52–60. [Google Scholar] [CrossRef]
  14. Qin, C.; Ji, P.; Wang, J.; Chang, C.-C. Fragile image watermarking scheme based on VQ index sharing and self-embedding. Multimed. Tools Appl. 2017, 76, 2267–2287. [Google Scholar] [CrossRef]
  15. Lin, C.C.; Huang, Y.H.; Tai, W.L. A novel hybrid image authentication scheme based on absolute moment block truncation al. coding. Multimed. Tools Appl. 2017, 76, 463–488. [Google Scholar] [CrossRef]
  16. Tai, W.L.; Liao, Z.J. Image self-recovery with watermark self-embedding. Signal Process. Image Commun. 2018, 65, 11–25. [Google Scholar] [CrossRef]
  17. Hong, W.; Zhou, X.; Lou, D.C.; Huang, X.; Peng, C. Detectability improved tamper detection scheme for absolute moment block truncation coding compressed images. Symmetry 2018, 10, 318. [Google Scholar] [CrossRef] [Green Version]
  18. Chen, C.C.; Chang, C.C.; Lin, C.C.; Su, G.D. TSIA: A novel image authentication scheme for AMBTC-based compressed images using turtle shell based reference matrix. IEEE Access 2019, 7, 149515–149526. [Google Scholar] [CrossRef]
  19. Su, G.; Chang, C.C.; Lin, C.C. High-precision authentication scheme based on matrix encoding for AMBTC-compressed images. Symmetry 2019, 11, 996. [Google Scholar] [CrossRef] [Green Version]
  20. Roy, S.S.; Basu, A.; Chattopadhyay, A. On the implementation of a copyright protection scheme using digital image watermarking. Multimed. Tools Appl. 2020, 79, 13125–13138. [Google Scholar]
  21. Hong, W.; Wu, J.; Lou, D.C.; Zhou, X.; Chen, J. An AMBTC authentication scheme with recoverability using matrix encoding and side match. IEEE Access 2021, 9, 133746–133761. [Google Scholar] [CrossRef]
  22. Chang, C.-C.; Lin, C.-C.; Su, G.-D. An effective image self-recovery based fragile watermarking using self-adaptive weight-based compressed AMBTC. Multimed. Tools Appl. 2020, 79, 24795–24824. [Google Scholar] [CrossRef]
  23. Lin, C.C.; He, S.L.; Chang, C.C. Pixel pair-wise fragile image watermarking based on HC-based absolute moment block truncation coding. Electronics 2021, 10, 690. [Google Scholar] [CrossRef]
  24. Lema, M.; Mitchell, O. Absolute moment block truncation coding and its application to color images. IEEE Trans. Commun. 1984, 32, 1148–1157. [Google Scholar] [CrossRef]
  25. Gray, R.M. Vector quantization. IEEE Trans. Acoust. Speech Signal Process. 1984, 1, 4–29. [Google Scholar] [CrossRef]
  26. Bas, P.; Furon, T. Image Database of BOWS-2. Available online: http://bows2.ec-lille.fr/ (accessed on 20 June 2017).
Figure 1. Example of AMBTC Compression: (a) Original image block, (b) Bitmap and (c) Restored image block.
Figure 1. Example of AMBTC Compression: (a) Original image block, (b) Bitmap and (c) Restored image block.
Electronics 12 00415 g001
Figure 2. Example of VQ compression.
Figure 2. Example of VQ compression.
Electronics 12 00415 g002
Figure 3. Watermark generation and embedding process.
Figure 3. Watermark generation and embedding process.
Electronics 12 00415 g003
Figure 4. Process for selecting embedding block position and generating the hidden message AC and RI.
Figure 4. Process for selecting embedding block position and generating the hidden message AC and RI.
Electronics 12 00415 g004
Figure 5. Binary digital table BD.
Figure 5. Binary digital table BD.
Electronics 12 00415 g005
Figure 6. Waves type table WT.
Figure 6. Waves type table WT.
Electronics 12 00415 g006
Figure 7. Watermark embedding example.
Figure 7. Watermark embedding example.
Electronics 12 00415 g007
Figure 8. Authentication and recovery process.
Figure 8. Authentication and recovery process.
Electronics 12 00415 g008
Figure 9. The refined tamper detection process.
Figure 9. The refined tamper detection process.
Electronics 12 00415 g009
Figure 10. Four original grey-scale images: (a) Lena, (b) Elaine, (c) Baboon, and (d) Airplane.
Figure 10. Four original grey-scale images: (a) Lena, (b) Elaine, (c) Baboon, and (d) Airplane.
Electronics 12 00415 g010
Figure 11. The visual performance for Airplane: (a) Cutting attack 1, (b) Detection of (a), (c) Recovery of (a), (d) Cutting attack 2, (e) Detection of (d), and (f) Recovery of (d).
Figure 11. The visual performance for Airplane: (a) Cutting attack 1, (b) Detection of (a), (c) Recovery of (a), (d) Cutting attack 2, (e) Detection of (d), and (f) Recovery of (d).
Electronics 12 00415 g011
Figure 12. The visual performance for Barbara: (a) Cutting attack 1, (b) Detection of (a), (c) Recovery of (a), (d) Cutting attack 2, (e) Detection of (d), and (f) Recovery of (d).
Figure 12. The visual performance for Barbara: (a) Cutting attack 1, (b) Detection of (a), (c) Recovery of (a), (d) Cutting attack 2, (e) Detection of (d), and (f) Recovery of (d).
Electronics 12 00415 g012aElectronics 12 00415 g012b
Figure 13. The visual performance for Airplane: (a) Copy-paste attack 1, (b) Detection of (a), (c) Recovery of (a), (d) Copy-paste attack 2, (e) Detection of (d), and (f) Recovery of (d).
Figure 13. The visual performance for Airplane: (a) Copy-paste attack 1, (b) Detection of (a), (c) Recovery of (a), (d) Copy-paste attack 2, (e) Detection of (d), and (f) Recovery of (d).
Electronics 12 00415 g013
Figure 14. The visual performance for Barbara: (a) Copy-paste attack 1, (b) Detection of (a), (c) Recovery of (a), (d) Copy-paste attack 2, (e) Detection of (d), and (f) Recovery of (d).
Figure 14. The visual performance for Barbara: (a) Copy-paste attack 1, (b) Detection of (a), (c) Recovery of (a), (d) Copy-paste attack 2, (e) Detection of (d), and (f) Recovery of (d).
Electronics 12 00415 g014
Figure 15. PSNRs of watermarked images vs. recovered image analysis against cutting attack 1.
Figure 15. PSNRs of watermarked images vs. recovered image analysis against cutting attack 1.
Electronics 12 00415 g015
Figure 16. PSNRs of watermarked images vs. recovered image analysis against copy-past attack 2.
Figure 16. PSNRs of watermarked images vs. recovered image analysis against copy-past attack 2.
Electronics 12 00415 g016
Figure 17. Four recovered images: (a) PSNR   = 44.12   dB , (b) PSNR   = 45.35   dB , (c) PSNR   = 34.95   dB , and (d) PSNR   = 42.69   dB .
Figure 17. Four recovered images: (a) PSNR   = 44.12   dB , (b) PSNR   = 45.35   dB , (c) PSNR   = 34.95   dB , and (d) PSNR   = 42.69   dB .
Electronics 12 00415 g017
Table 1. Tamper localization and recovery analysis against cutting attack 1.
Table 1. Tamper localization and recovery analysis against cutting attack 1.
ImagesαTPTNFPFNTPRFPRWatermarkedRecovered
Lena2.04%60322560480640.9895048.29 dB43.70 dB
Elaine2.04%60322560960160.9973048.33 dB43.52 dB
Baboon2.04%60322560960160.9973048.34 dB43.67 dB
Airplane2.04%60322560480640.9895048.21 dB42.86 dB
Barbara2.04%603225598401280.9792048.32 dB41.54 dB
Table 2. Tamper localization and recovery analysis against cutting attack 2.
Table 2. Tamper localization and recovery analysis against cutting attack 2.
ImagesαTPTNFPFNTPRFPRWatermarkedRecovered
Lena0.74%272025937616320.98830.00006248.29 dB45.59 dB
Elaine0.74%272025939216160.99410.00006248.33 dB44.87 dB
Baboon0.74%272025936016480.98260.00006248.34 dB43.19 dB
Airplane0.74%272025937616320.98830.00006248.21 dB46.05 dB
Barbara0.74%272025939216160.99410.00006248.32 dB42.08 dB
Table 3. Tamper localization and recovery analysis against copy-paste attack 1.
Table 3. Tamper localization and recovery analysis against copy-paste attack 1.
ImagesαTPTNFPFNTPRFPRWatermarkedRecovered
Lena4.53%13824248128481440.98960.00019348.29 dB41.43 dB
Elaine4.53%13776248144961280.99070.00038748.33 dB39.59 dB
Baboon4.53%13824248144481280.99080.00001948.34 dB34.52 dB
Airplane4.53%13744248176128960.99300.00051548.21 dB42.54 dB
Barbara4.53%1377624817696960.99300.00038748.32 dB39.29 dB
Table 4. Tamper localization and recovery analysis against copy-paste attack 2.
Table 4. Tamper localization and recovery analysis against copy-paste attack 2.
ImagesαTPTNFPFNTPRFPRWatermarkedRecovered
Lena1.84%609625585601920.9694048.29 dB45.31 dB
Elaine1.84%609625587201760.9719048.33 dB43.92 dB
Baboon1.84%6080255856161920.96930.00006348.34 dB40.93 dB
Airplane1.84%609625588801600.9744048.21 dB41.49 dB
Barbara1.84%609625587201760.9719048.32 dB38.06 dB
Table 5. Performance comparison of tamper detection and image quality against four types of attacks.
Table 5. Performance comparison of tamper detection and image quality against four types of attacks.
AttacksαTPTNFPFNTPRFPRWatermarkedRecovered
Attack 1a2.04%59842559984811498.16%0.02%48.0242.13
Attack 1b0.74%261125924412516494.16%0.05%48.0743.58
Attack 2a4.53%137922481388013499.04%0.03%48.0238.08
Attack 2b1.84%60722558622418697.03%0.01%48.0242.55
Table 6. Performance comparison of tamper detection and image quality against two types of attacks with different attack ratios.
Table 6. Performance comparison of tamper detection and image quality against two types of attacks with different attack ratios.
AttacksαTPTNFPFNTPRFPRWatermarkedRecovered
Attack 1a2.04%59842559984811498.16%0.02%48.0242.13
Attack 1a4.36%11932248304756115291.54%0.30%48.0636.49
Attack 2a4.53%137922481388013499.04%0.03%48.0238.08
Attack 2a9.61%28205232647113915399.46%0.49%48.0831.26
Table 7. Performance comparison with Lin et al.’s AMBTC-based scheme [23].
Table 7. Performance comparison with Lin et al.’s AMBTC-based scheme [23].
SchemesImagesαTPTNFPFNTPRFPRWatermarkedRecovered
ProposedLena2.04%60322560640480.9921048.29 dB44.12 dB
Elaine0.74%27362593920160.9941048.32 dB45.35 dB
Baboon4.53%13824248128481440.98960.0001948.33 dB34.95 dB
Airplane1.84%609625588801600.9744048.20 dB42.69 dB
Lin et al. [23]Lena1.93%49502568821102020.96080.000446.8 dB37.9 dB
Elaine0.6%14472601831213930.78640.000446.8 dB41.7 dB
Baboon3.44%874025170728714100.86110.001146.8 dB31.8 dB
Airplane1.41%32292578704595860.84640.001846.8 dB35.5 dB
Table 8. Performance comparison of proposed scheme versus eleven schemes.
Table 8. Performance comparison of proposed scheme versus eleven schemes.
SchemesPSNR of Watermarked ImagesPSNR of Recovered ImagesCondition of RecoveryAttack Types
Zang et al. [3]37.9 dB[26, 29] dBα < 59%copy-paste
Zang et al. [7]37.9 dB40.7 dBα < 24%copy-paste
Yang et al. [9]51.3 dB[24, 36] dBα <50%copy-paste
Qin et al. [12][37.92, 51.14] dB[40.74, 51.12] dBα <20%cutting/copy-paste
Cat et al. [13][44.11, 44.17] dB[36.90, 46.34]α <20%cutting
Qin et al. [14]44.15 dB[30.36, 36.21] dBα <60%copy-paste
Lin et al. [15]37.9 dB+∞α < 26%copy-paste
Roy et al. [20][37.92, 54.13] dB[28.63, 46.98] dBα < 50%rotation/
salt & pepper 1
Hong et al. [21][43.19, 47.04] dB[21.31, 41.77] dBα < 15%copy-paste
Chang et al. [22]49.76 dB34.65 dBα < 50%cutting, copy-paste
Lin et al. [23]46.8 dB[32, 42] dBα < 50%copy-paste
Proposed scheme[48.21, 48.34] dB[34.95, 44.12] dBα < 50%cutting, copy-paste
Note 1. Roy et al.’s watermarking is the robust watermarking; they tested five attacks, such as rotation, salt and pepper, median filtering, scaling, and JPEG compression attacks, to prove their robustness.
Table 9. Comparison between proposed and other BTC/AMBTC/VQ-based fragile watermarking schemes.
Table 9. Comparison between proposed and other BTC/AMBTC/VQ-based fragile watermarking schemes.
SchemesImage TypePSNR of Watermarked Image (dB)AC CodeAC EmbeddingRecovery
Lee et al. [5]Spatial images39.6SVD codes, random streamLSB substitution/pixelsYes
Lin et al. [8]AMBTC-compressed images34.11Random stream, preprocessed bitmapSubstitution/quantization level(s)No
Li et al. [11]BTC-compressed images41.62Random streamMatrix encoding/quantization levelsNo
Qin et al. [12]Spatial images44.15A hash value of VQ indices and original imageLSB substitution/pixelsYes
Lin et al. [15]AMBTC-compressed images37.9Random streamHybrid embedding/quantization levels and bitmapNo
Hong et al. [17]AMBTC-compressed images30.41 1A hash value of bitmap and MSBs of two quantization levelsLSB substitution/quantization levelsNo
Chang et al. [18]AMBTC-compressed images32.60Bitmap and random streamTurtle shell data hiding/ quantization levelsNo
Su et al. [19]AMBTC-compressed images31.99Random streamMatrix encoding/ bitmapYes
Hong et al. [21]AMBTC-compressed images44.51A hash value of flipped bitmapsAPPM/quantization levelsYes
Chang et al. [22]Spatial images49.76Compression code of bitmapTurtle shell data hiding/pixel pairYes
Lin et al. [23]Spatial images46.8RI derived from AMBTC compression codesMatrix encoding/pixel pairYes
Proposed schemeSpatial images48.21Hash value of AMBTC compression codesDouble matrix encoding/pixel pairYes
Note:1 It is the PSNR offered by Hong et al.’s MSBP.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lin, C.-C.; Lee, T.-L.; Chang, Y.-F.; Shiu, P.-F.; Zhang, B. Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ. Electronics 2023, 12, 415. https://doi.org/10.3390/electronics12020415

AMA Style

Lin C-C, Lee T-L, Chang Y-F, Shiu P-F, Zhang B. Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ. Electronics. 2023; 12(2):415. https://doi.org/10.3390/electronics12020415

Chicago/Turabian Style

Lin, Chia-Chen, Ting-Lin Lee, Ya-Fen Chang, Pei-Feng Shiu, and Bohan Zhang. 2023. "Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ" Electronics 12, no. 2: 415. https://doi.org/10.3390/electronics12020415

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop