Abstract

This paper presents a reference sharing mechanism-based self-embedding watermarking scheme. The host image is embedded with watermark bits including the reference data for content recovery and the authentication data for tampering location. The special encoding matrix derived from the generator matrix of selected systematic Maximum Distance Separable (MDS) code is adopted. The reference data is generated by encoding all the representative data of the original image blocks. On the receiver side, the tampered image blocks can be located by the authentication data. The reference data embedded in one image block can be shared by all the image blocks to restore the tampered content. The tampering coincidence problem can be avoided at the extreme. The maximal tampering rate is deduced theoretically. Experimental results show that, as long as the tampering rate is less than the maximal tampering rate, the content recovery is deterministic. The quality of recovered content does not decrease with the maximal tampering rate.

1. Introduction

With the rapid development of information science and computer network techniques, digital images can be easily copied, altered, and spread over the network. The problems of copyright protection, authentication, and integrity identification of digital images [1, 2] are still a focus of multimedia information security research. Self-embedding watermarking technique is proposed [3] to detect the tampered image areas and recover approximately the tampered content. In most self-embedding watermarking schemes, the original image will be partitioned into nonoverlapping blocks. In addition to the authentication data for detecting the tampered image blocks, the reference data for recovering the tampered image blocks is embedded in the redundant space of the image. The watermark data is composed of the reference data and the authentication data. The performance of self-embedding schemes is commonly evaluated by the peak signal to noise ratio (PSNR) between the original image and the watermarked image, PSNR between the recovered image and the watermarked image, and a bound on the allowed amount of modifications, that is, the maximal tampering rate.

In some self-embedding schemes, the reference data is the representative information of the original image blocks such as the prime DCT (Discrete Cosine Transform) coefficients, the MSB (Most Significant Bit) bits of the block pixels or the vector quantization values. The reference data of an image block is usually embedded into another different image block according to the predetermined rule. In [3], the primary DCT coefficients of an image block were quantized and binary encoded, and the resulting bit string was inserted into the LSB of an offset block. In [4], the reference data is also the quantized and encoded DCT coefficients; the embedding position is determined by a block-mapping sequence. As the analysis in [5], this embedding method will result in the problems of the tampering coincidence and watermark waste. The first problem means that when both the image block and the image block containing its representative information are tampered or lost, the content recovery will fail. The second problem means that when both of them are reserved, the watermark data embedded in will be useless. To alleviate the problem of the tampering coincidence, in some other schemes the representative information for one image block will be duplicated and embedded in the image for many times. As in [6], for each image block, there are two copies of its representative information hidden in two different blocks that provide the second chance for block recovery in case one copy is destroyed. In [7], the representative information of the image block is the VQ index. Compared with [6], more copies of the representative information are embedded. The same processing method appear in [811]. By using this method the probability of tampering coincidence is reduced, but the cost of watermark waste increased.

In some other schemes, coding technique is introduced. The reference information is not the representative data of the original image blocks. The reference data is generated by encoding the representative information [1223]. In [12, 13], the reference sharing mechanism for watermark self-embedding is proposed. The reference information of one image block will be distributed over many blocks. The 5 MSB bits of the image pixels are pseudo-randomly permuted and divided into groups. Each group is multiplied by a pseudo-random binary matrix to generate the reference data. All the reference bits are then pseudo-randomly permuted and divided into groups, which will be embedded in the image blocks. Scrambling and coding make the reference bits to be embedded in an image block derived from the MSB bits of many different image blocks and shared by these blocks for content restoration. When the number of tampered image blocks is not more than a certain threshold, there is always some part of the reference available. So, the tampering coincidence problem is avoided. This thought is also reflected in the other schemes [1419]. In [17], the reference sharing mechanism for watermark self-embedding is extended. The numbers of the MSB layers to generate the reference bits are flexible and the numbers of LSB layers to accommodate watermark bits are variable. The relationship for the overall performance of self-embedding scheme, the embedding modes that are used, and the ranges of tampering rates are presented. In [21], the erasure channel is taken as the natural model of the self-embedding problem, and the random linear fountain (RLF) code is used to encode the representative information of all image blocks to generate the reference data. The reference bits to be embedded in an image block will be shared by all the image blocks for content restoration; the tampering coincidence problem can be avoided at the extreme. For that reason, with the same rate of reference information per image block, the proposed approach in [21] allows for working with higher tampering rates than other self-embedding schemes. In these classic reference sharing mechanism-based self-embedding schemes, the binary random matrix is used as the encoding matrix. The tampered image blocks will be restored with probability, but not deterministically. In our scheme, we use the special matrix as the encoding matrix to construct the reference sharing mechanism-based self-embedding scheme. The reference information to be embedded in an image block can be shared by all the image blocks. So the tampering coincidence problem can be avoided at the extreme. As long as the tampering rate is not larger than the maximal tampering rate, the representative data of the tampered image blocks can be recovered deterministically.

The remaining part of the paper is organized as follows. Section 2 reviews the reference data generation method of the prior reference sharing mechanism-based schemes. The detailed procedure of the proposed self-embedding watermarking scheme is presented in Section 3. Section 4 analyzes the bound on the maximal tampering rate of the proposed scheme. The experimental evaluation and comparisons with the existing schemes are presented in Section 5.

The method of the reference sharing for self-embedding schemes is proposed and described in detail in [12, 13]. This technique is also applied in some other schemes [1719, 21, 22]. But in these schemes the encoding matrices are the binary random matrices. In [13] the original image is an 8-bit gray-level image. The 5 MSB of each pixel are collected and permuted based on the secret key and then divided into subsets, each of which containing bits. For each subset, the reference data generation is performed bywhere is the encoding matrix, which is a binary random matrix sized , and is the mth subset of the 5 MSB. The generated reference data will be stored as part of the watermark in the 3 LSB planes of the image block. The systems of linear equations in (1) establish a link between the reference data and the 5 MSB of the original image. Scrambling and coding make the reference bits embedded in an image block derived from the MSB bits of many different image blocks and shared by these blocks for content restoration.

After the tampering detection procedure, all the image blocks of the watermarked image will be marked as either “tampered” or “reserved.” The ratio between the number of tampered image blocks and the number of all blocks is called the tampering rate, which will be denoted as . The maximal tampering rate is denoted as , which is the upper bound of the tampering rate the scheme can tolerate. Recollect the 5 MSB of each pixel while marking the MSB of the tampered blocks as the unknowns. Separate the reference bits from the watermark while marking the reference bits of the tampered blocks as the unknowns. Reconstruct the M systems of linear equations in (1). For each equation, the invalid equations that the reference bit is unknown are removed:where and are the constant vector and the coefficient matrix after removing the invalid equations. Then reformulate the equations for the standard system of equations as follows:where is the coefficient matrix of the standard system of equations. If the rank of the coefficient matrix is equal to the number of unknowns, the system of equations in (3) will have the unique solution. In other words, the necessary and sufficient condition for the solution of (3) is that, for any submatrix of the binary random matrix, if the number of rows of it is greater than the number of columns, the submatrix is full column rank. However, this condition can only be satisfied with the probability because both the matrix and the tampering are random. The probability is dependent upon the tampering rate, image size, and system parameter , which has been deduced in [13].

In brief, using the binary random matrix as the encoding matrix, the procedure of the encoding and decoding will be simple. However, because of the randomness of the encoding matrix and tampering, the tampered image blocks will be restored with probability, but not deterministically. According to the knowledge of coding theory [24], we knew that if is the generator matrix of the systematic MDS code, any square submatrix of will be nonsingular. This is equivalent to saying that, for any submatrix of , if the number of rows of it is greater than the number of columns, the submatrix is full column rank. Due to the excellent properties of the matrix , we use it in this paper to construct the reference sharing mechanism-based self-embedding watermarking schemes. We select the appropriate matrix to generate the reference data by encoding the representative data of all image blocks based on the matrix . By this way, the generated reference information embedded in an image block will be shared by all the image blocks. Based on this spreading mechanism, our method can be immune to the tampering coincidence and the reference waste. Moreover, after locating the tampered image blocks by the embedded authentication data, as long as the tampering rate is larger than the maximal tampering rate, the restoration will be deterministic due to the use of the matrix . The tampered image blocks can be reconstructed by using the recovered representative data.

3. Proposed Self-Embedding Watermarking Scheme

Similar to the common self-embedding schemes, the proposed watermarking scheme includes the following two parts: the first one is the watermark generation and embedding and the second one is the tampering detection and content recovery. The detailed process will be described in the following section.

3.1. Watermark Generation and Embedding

Watermark generation and embedding procedure can be divided into four phases: the first one is the representative data generation, the second is the reference data generation, the third one is the authentication data generation, and the last one is watermarking embedding.

3.1.1. Representative Data Generation

Step 1. Divide the original image into nonoverlapping blocks. They are marked as the first, the second, and so on and the th block by the Zig-Zag order.

Step 2. Collect the representative data of each image block. The representative data can be the compressed data of image block, for example, the prime DCT coefficients and the MSB bits of the block pixels. There are representative data blocks in total, which are denoted as .

Step 3. Calculate the ratio . is the ratio of the length of the representative data block to the size of the redundant space used to embed the reference data in one image block. In our scheme, we suppose is an integer or is an integer.

For example, suppose the original image is divided into 9 blocks sized 8 × 8 pixels. The redundant space of an image block is the 3 LSB of all pixels in the image block. If we use 160 bits to store the reference data block data and we use the prime DCT coefficients to represent the image block and quantified and encoded the DCT coefficients to 80 bits, the calculated ratio is 1/2. If the 5 MSB of all pixels in an image block are extracted as the representative data of this image block, the length of the representative data block is 320 bits and the calculated ratio is 2.

3.1.2. Reference Data Generation

Step 1. Encoding the representative data of image blocks to generate the reference data , there are two cases needed to be considered.

Case 1. The ration is less than or equal to 1. Encode the representative data blocks in the following way:where is the rows and columns matrix and is the generator matrix of the systematic -MDS code over the finite field. The calculating is finished over the finite field. For this purpose,    will be transformed to an n-dimensional column vector in the finite field. For example, is transformed to . So, (4) can be rewrote asSo, are -dimensional column vectors in the finite field. Let The reference data in the finite field is generated.

Case 2. The ration is greater than 1. First,    are divided into smaller blocks . The length of each smaller block will be equal to the size of the redundant space used to embed the reference data block in an image block. Then generate the data blocks in the following way:where is the rows and K columns matrix and is the generator matrix of the systematic ((R+1)K, RK)-MDS code over the finite field. As described above, to finish the calculation over the finite field will be transformed to an n-dimensional column vector in the finite field. So, (7) can be rewrote as is the reference data in the finite field.

Step 2. Transform to bit strings. The bit strings are denoted as .
The generated reference data blocks will be embedded as a part of watermark into the redundant space of the corresponding image block. From (4) and (7), it can be seen that the data block or is the linear combination of all the representative data blocks. That means each data block carries the information of all the image blocks. The reference data block embedded in any image block can provide the recovery information equally for any tampered image, or the reference data block embedded in any image block will be shared by all the image blocks. By this way, a global reference share mechanism has been realized.

3.1.3. Authentication Data Generation

For the th image block, the representative data and the reference data are connected and then fed into a hash function to generate the hash bits . The hash values are the authentication data blocks which will be embedded into the redundant space of the image block as a part of the watermark. The redundant space of the image block is divided into two parts, one for the reference data and the rest for the hash data. So, the length of the hash data is equal to the length of the rest redundant space. In our experiment, we use the MD5 function; the output is shortened by exclusive disjunction on neighboring bit pairs to generate the required length hash data.

3.1.4. Watermark Embedding

Step 1. The reference data and the authentication data are connected and permuted based upon the secret key to generate the watermark .

Step 2. is embedded into the redundant space of the th image block. After all the image blocks have been processed, the watermarked image is produced. In our experiment, the 3 LSB of the th image block is replaced by the watermark to generate the watermarked image.

3.2. Tampering Detection and Content Recovery

Suppose the watermarked image has been altered without changing the size. For the receiver, the tampered image blocks will be identified and located firstly; then the tampered image blocks will be recovered. So, the tampering detection and content recovery procedure can be divided into two phases: tampered blocks detection and tampered blocks recovery.

3.2.1. Tampered Blocks Detection

Step 1. The received image is divided and the representative data of all the image blocks is collected as in the preprocessing.

Step 2. For the th image block, the watermark is extracted from the redundant space, scrambled inversely using the same secret key and decomposed into two parts: the reference data block and the hash data.

Step 3. For each image block, input the representative data and the extracted reference to the HASH function to recalculate the hash value.

Step 4. Compare the recalculated hash value and the extracted hash data. If they are different, the image block is judged as a “tampered” image block; otherwise, it is judged as a “reserved” image block.

3.2.2. Tampered Blocks Recovery

As long as the tampering rate is not larger than the maximal tampering rate, we can perfectly recover the failed representative data of the tampered image blocks. The maximal tampering rate will be derived theoretically in Section 4. The procedure of tampered blocks recovery can be illustrated as follows. Take the case that the ration is less than or equal to 1 as an example; the same result can be derived when R is greater than 1.

Step 1. Reconstruct the linear equations (4). Suppose there are tampered image blocks. In order to explain the problem simply, it may be assumed that the front blocks are tampered. The remaining blocks are the reserved image blocks. The reference data extracted from the tampered image blocks and the representative data of them are denoted as and . The reference data extracted from the reserved image blocks and the representative data of them are denoted as and . Divide and into parts:Then we can reconstruct the linear equations (4) as The representative data of the tampered image blocks are the unknowns of the linear equations. We need to solve them by (10).

Step 2. Eliminate the equations that are invalid. are from the tampered image blocks. The data may have been tampered. So, their equations are invalid. Cross out the invalid equations and reformulate the system of equations as a standard form of equations.whereis the columns taken from corresponding to the extracted correct reference data blocks .

Step 3. Rearranging (11) as the standard form and moving the portion with the unknowns to the right of the equations, we can reformulate (11) as follows: where and are the rows of corresponding to the representative data blocks and , respectively.

Step 4. Solve the unknowns according to the equations. The calculation will be finished over the finite field. It can be demonstrated that if the tampering rate is not larger than the maximal tampering rate, the number of equations is more than the number of the unknowns. So, we can rewrite (12) aswhere is the front data blocks of . is the matrix whose columns are the first columns of the matrix . We can see that the matrix is the square submatrix of A. From [24], we have known that is the generator matrix of the systematic MDS code if and only if any square submatrix of A is nonsingular. So, will be nonsingular because is the generator matrix of systematic MDS. Therefore, (13) has a unique solution. We can solve (13) over the finite field to retrieve the original values of . So, we can recover the representative data of tampered image blocks definitely. Similarly, the same result can be derived when .

The recovered representative data can be used to reconstruct the tampered image blocks. The quality of recovered content depends on the method of generating the representative data. Provided that the tampering rate is not larger than the maximal tampering rate, the quality of the reconstructed content does not degrade with the tampering area increasing.

4. The Upper Bound on the Tampering Rate

Suppose image blocks are tampered. Because any square submatrix of the coding matrix is nonsingular, as long as the number of equations is more than the number of the unknowns in (12), (13) will have the unique solution. From this the maximal tampering rate can be easily derived theoretically.

Case 1. The ration is less than or equal to 1. If an image block is identified as a tampered block, there will be one data block and reference data blocks stored in the image block identified as the failed data blocks. After crossing out the invalid equations, there will be valid equations. In order to make (13) have unique solution, we should have . From this inequality, we can work out . is the ratio of the tampered image blocks to all the image blocks. So, in this case the maximal tampering rate is

Case 2. The ration is greater than 1. In this case, the same conclusion can be drawn according to the discussion method in Case . So, In all cases, the maximal tampering rate

Figure 1 shows the curve about the maximal tampering rate with respect to the ratio . The curve indicate that the maximal tampering rate will decrease as the ratio decreases. If we want to improve the restoration capability, we should try to reduce the ratio by reducing the length of the representative data block or improve the size of the redundant space.

5. Experimental Evaluation and Comparisons

Experiments and comparison were conducted to demonstrate the effectiveness and evaluate the performance of the proposed scheme.

Figure 2(a) is the standard test gray scale image lake sized 512 × 512 which is used as the host image. The host image is divided into blocks sized 8 × 8 pixels. So, the number of image blocks . The representative data of an image block is all the 5 MSB of the pixels in the image block. So, the length of the representative data of an image block is 320 bits. The redundant space of an image block is all the 3 LSB of the pixels in the image block. The size of it is 192 bits. We will use 160 bits to store the reference data and the remaining 32 bits to store the hash data. So, we can calculate the ratio is 2. The coding matrix should be a 213  × 212 matrix and should be the systematic MDS code generator matrix. Here we generate the matrix by constructing the 213  × 212 Cauchy matrix over (216) [24].

The 320-bit protected data of each image block will be divided into two smaller blocks with size of 160 bits. So, there are 213 smaller data blocks in total. Each data block will be represented as a column vector of 10 elements in the finite field (216). Then we calculate the 212 reference data blocks according to (7). Each reference data block will be a column vector of 10 elements in the finite field (216) and can be transformed into a bits string of length 160 bits. For each image block, the representative data will be linked with the corresponding reference data and then is fed into the MD5 function to produce the hash value. The output hash bits are shortened by exclusive disjunction on neighboring bit pairs to generate the 32 bits hash data. Then, the 160 bits reference data and the 32 bits hash data are linked and permuted. We permuted the 192 bits based on a pseudo-random sequence from the logistic chaotic system and use the initial condition as the secret key. The permuted 192 bits are embedded into the image block by replacing the three LSB planes of the block. This way, the watermarked image is produced. Figure 2(b) is the watermarked Lake. The values of PSNR due to watermark embedding are 37.9 dB. According to (14), it can be derived that the maximal tampering rate of the tested self-embedding scheme is 1/3.

Figure 3 shows the results of the meaningful tampering experiments. The watermarked lake is maliciously tampered with tampering rate = 9.8%, 21.83%, and 32.69%. The tampered watermarked images are shown in Figure 3((a1)–(a3)) and their corresponding identification and restoration results are shown in Figure 3((b1)–(b3)) and Figure 3((c1)–(c3)). We can see all tampered blocks are located correctly. The tampered blocks are represented by the extreme white. The original MSB of tampered blocks were recovered without any error. In the three cases, PSNR values in the restored area are all 40.7 dB when regarding original image as reference. The quality of the recovered content does not degrade with the growth of tampering rate. We applied the method in [13] and forced the first and second LSB of the restored area as 0 and the third LSB as 1. The experiment demonstrates that if the ratio , the proposed scheme can perfectly recover the representative data of the tampered image blocks as long as the tampering rate .

To evaluate the performance of the proposed scheme, we also conduct the random tampering experiments, seen in Figure 4. The gray scale image Lena, Baboon, Gold Hill, and Airplane in Figure 4((a1)–(d1)) are used as the host images. The watermarked images, shown in Figure 4((a2)–(d2)), are generated as the lake. The values of PSNR due to watermark embedding are 37.9. The watermarked images are tampered randomly with tampering rate = 10%, 18%, 24%, 33%. The tampered images are shown in Figure 4((a3)–(d3)). The corresponding identification and restoration results are shown in Figure 4((a4)–(d4)) and Figure 4((a5)–(d5)). It can be seen that the perfect recovery has been realized in all the experiments. PSNR values in the restored area are all 40.7 dB when regarding original image as reference.

Another experiment was conducted to test the performance of the proposed scheme when the ratio is less than 1. In the experiment, the standard test gray scale image lake sized 512 × 512 (shown in Figure 5(a)) is still used as the host image. The host image is divided into blocks sized 8 × 8 pixels. The representative data of an image block is the quantified and encoded DCT coefficients. The quantization procedure is the same as that employed in [21]. The quantified DCT coefficients in each block are converted to binary sequences by the following allocation vector:which results in a total of 56-bit representative data of an image block.

The redundant space of an image block is still all the 3 LSB of each pixel in the image block. So, the size of redundant space is still 192 bits. We will use 168 bits to store the reference data block and the remaining 24 bits to store the hash data. So the ratio is 1/3. The coding matrix will be 212 rows and 3 × 212 columns matrix and should be the generator matrix of a systematic MDS code. Just as in the first experiment, we generate the matrix A by constructing the 212 rows and 3 × 212 columns Cauchy matrix over (214). The 56-bit representative data of each image block will be transformed into 4 elements in the finite field (214). According to (4), the 3 × 212 column vectors in the finite field (214) are generated. For , we transform to bit strings and then connect the three bit strings to generate the 168 bits reference data Ri. The 24-bit hash data and the watermarked image (shown in Figure 5(b)) are generated as in the first experiment. The values of PSNR due to watermark embedding are 37.9 dB. According to (14), it can be calculated that the maximal tampering rate of the tested self-embedding scheme is 3/4.

Figure 6 shows three meaningful tampering experiments. The watermarked lake is maliciously tampered with tampering rate %, 54.35%, and 74.76%. The tampered watermarked images are shown in Figure 6((a1)–(a3)), and their corresponding identification and restoration results are shown in Figure 6((b1)–(b3)) and Figure 6((c1)–(c3)). Just as in the first experiment, the tampered blocks are located correctly. The quantified and encoded DCT coefficients of tampered blocks were recovered without any error. In the three cases, PSNR values in the restored area are all 25.2 dB when regarding original image as reference. The experiment demonstrates that if the ratio , the proposed scheme can perfectly recover the tampered image as long as the tampering rate .

The random tampering experiments were also conducted (as seen in Figure 7). The gray scale images Lena, Baboon, Gold Hill, and Airplane in Figure 7((a1)–(d1)) are used as the host images. The watermarked images, shown in Figure 7((a2)–(d2)), are generated as the lake. The values of PSNR due to watermark embedding are 37.9. The watermarked images are tampered randomly with tampering rate = 40%, 49%, 58%, and 75%. The tampered images are shown in Figure 7((a3)–(d3)). The corresponding identification and restoration results are shown in Figure 7((a4)–(d4)) and Figure 7((a5)–(d5)). It can be seen that the recovery has been realized in all the experiments. PSNR values in the restored area are 27.8, 21.7, 26.9, and 26.9, respectively, when regarding original image as reference.

We compared the restoration capability of the proposed scheme with that of several other self-embedding watermark schemes. For the proposed scheme, the reference data embedded in one image block will be shared by all the image blocks. By using this global reference sharing mechanism and the special coding matrix, the problem of tampering coincidence is avoided absolutely. In the same experimental condition, the most extensive tampering area could be recovered and the recovery process is deterministic. Moreover, the quality of the restored content does not decrease as the percentage of tampering increases. However, the reference sharing mechanism had not been employed in the schemes [11, 20]. The reference data is embedded in another image block according to the block mapping. By this way the tampering coincidence cannot be avoided absolutely but only with the high probability. In the two schemes, if the tampering coincidence happened, the tampered blocks will be recovered with the neighborhood average. The maximal tampering rates are about 50% and 80%, respectively. But the data is obtained only by experiments, not by rigorous theoretical proof. Moreover, the PSNR of restored content in the two schemes decreases as the proportion of tampered area increases.

We also compare the restoration capability among different schemes based on the reference sharing mechanism. The PSNR between the original image and the watermarked image, the PSNR between the recovered image and the watermarked image or the original image, and the maximal tampering rate are considered. The experimental parameters of method 1 in [13] are the same as the proposed scheme when the ratio is 2, which has been tested in the above experiment. All the two methods exploit 3 LSB watermark embedding. Therefore, the PSNR due to watermarking embedding is identical and equals 37.9 dB. The representative data blocks are all the 5 MSB of pixels in an image block and the length of the generated reference data blocks are all 160 bits. When the tampering rate is not larger than the maximal tampering rate, all the schemes can recover the representative data. PSNR values in restored area are identical and equal 40.7 dB when regarding original image as reference. But the maximal tampering rate of our proposed method is 33%, which is better than 24%, the maximal tampering rate of method 1 in [13]. The reason is the reference data embedded in one image block is shared by some image blocks but not all the image blocks. The local reference sharing method cannot get the maximum tamper ratio. The experimental parameters of the method in [21] are the same as the proposed scheme when the ratio is 1/3, which has been tested in the above experiment. Both the proposed method and the method in [21] are based on the global reference sharing mechanism. They have the same restoration performance, while the encoding matrix applied to methods in [13, 21] is the random matrix. The random matrix can only promise the restoration can be successful with a great probability. In contrast the proposed method offers a deterministic self-embedding scheme by using the different encoding matrix.

6. Conclusion

In this paper, we proposed a self-embedding watermarking scheme based on the reference sharing mechanism. In the proposed scheme the special coding matrix is adopted and the global reference sharing mechanism is realized. The tampering coincidence and the reference waste are avoided. Based on our model, the maximal tampering rate can be derived in theory and considering the trade-off between the quality of recovered content and the restoration condition become more feasible. As long as the tampering rate is not larger than the maximal tampering rate, the representative data of the tampered image blocks can be recovered deterministically. The quality of the recovered content does not decrease as the proportion of tampered area increases. Moreover, the proposed scheme is reconfigurable. We experimentally evaluated the scheme in two sorts of configurations. Our experimental results demonstrate that the proposed method is effective.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper. The mentioned received funding in the “Acknowledgment” section did not lead to any conflict of interests regarding the publication of this manuscript.

Acknowledgments

This work is supported by the National Natural Science Foundation of China (NSFC) under Grant no. U1536110.