Skip to main content
  • Research Article
  • Open access
  • Published:

A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering

Abstract

This study presents an authentication method with self-recovery ability. The hidden watermark in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers the tampered portion. To increase the ability to recover from tampering, the recovery data are shared by using an (r, n) threshold scheme and then scattered all over the image. Experimental results indicate that the visual quality of the watermarked image is acceptable, and that the positions of the tampered portions can be identified. Most importantly, the self-recovery result is very competitive.

Publisher note

To access the full article, please see PDF.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Jie Chang.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Chang, YJ., Wang, RZ. & Lin, JC. A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering. EURASIP J. Adv. Signal Process. 2008, 846967 (2009). https://doi.org/10.1155/2008/846967

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1155/2008/846967

Keywords