期刊文献+

Wavelet Based Image Authentication and Recovery 被引量:3

Wavelet Based Image Authentication and Recovery
原文传递
导出
摘要 In this paper, we propose a secure semi-fragile watermarking technique based on integer wavelet transform with a choice of two watermarks to be embedded. A self-recovering algorithm is employed, that hides the image digest into some wavelet subbands for detecting possible illicit object manipulation undergone in the image. The semi-fragility makes the scheme tolerant against JPEG lossy compression with the quality factor as low as 70%, and locates the tampered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced by using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees safety of a watermark, recovery of image and localization of tampered area. In this paper, we propose a secure semi-fragile watermarking technique based on integer wavelet transform with a choice of two watermarks to be embedded. A self-recovering algorithm is employed, that hides the image digest into some wavelet subbands for detecting possible illicit object manipulation undergone in the image. The semi-fragility makes the scheme tolerant against JPEG lossy compression with the quality factor as low as 70%, and locates the tampered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced by using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees safety of a watermark, recovery of image and localization of tampered area.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第6期795-804,共10页 计算机科学技术学报(英文版)
基金 This work was supported by the Higher Education Commission of the Government of Pakistan under the Indigenous Ph.D.Scholarship Program(Grant No.17-5-1(Cu-180)HEC/Sch/2004/4343).
关键词 semi-fragile watermark integer wavelet transform (IWT) discrete cosine transform (DCT) JPEG compression authentication and self-recovery semi-fragile watermark, integer wavelet transform (IWT), discrete cosine transform (DCT), JPEG compression, authentication and self-recovery
  • 相关文献

参考文献19

  • 1Alessandro Piva, Franco Bartolini, Roberto Caldelliy. Selfrecovery authentication of images in the DWT domain. International Journal of Image and Graphics, 2005, 5(1): 149-166.
  • 2Fei C, Kundur D, Kwong R H. Analysis and design of secure watermark-based authentication systems. IEEE Transactions on Information Forensics and Security, 2006, 1(1): 43-55.
  • 3Ingemar J Cox, Gwenae Doerr, Teddy Furon. Watermarking is not cryptography. LNCS 4283, Springer, 2006, pp.1-15.
  • 4Fei C, Kundur D, Kwong R H. Achieving computational and unconditional security in authentication watermarking:Analysis, insights, and algorithm. In Proc. SPIE: Security and Watermarking of Multimedia Contents VII, Vol. 5681, San Jose, California, 2005, pp.697-708.
  • 5Luis Perez-Freire, Pedro Comesana, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez. Watermarking security: A survey. Transactions on Data Hiding and Multimedia Security 1, 4300, 2006, pp.41-72.
  • 6Hartung F, Kutter M. Multimedia watermarking techniques. In Proc. IEEE, USA, 1999, 87(7): 1079-1107.
  • 7Friedman G L. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transaction on Consumer Electronics, Rosemont, IL, USA, 1993, 39(4): 905-910.
  • 8Xiang Zhou, Xiaohui Duan, Daoxian Wang. A semifragile watermark scheme for image authentication. In Proc. IEEE, 10th International Multimedia Modeling Conference (MMM'O4), Brisbane, Australia, 2004, pp.374-377.
  • 9Hua Fiun, Xiuo-Ping Zhang. Fragile watermark based on the Gaussian mixture model in the wavelet domain for image authentication. IEEE International Conference on Image Processing, Barcelona, Spain, Vol. 1, 2003, pp.505-508.
  • 10Kurato Maeno, Qibin Sun, Shih-Fu Chang, Masayuki Suto. New semi-fragile image authentication watermarking techniques using random bias and non-uniform quantization. IEEE Transactions on Multimedia, 2006, 8(1): 32-45.

同被引文献21

  • 1van SCHYNDEL R G, TIRKEL A Z, OSBOME C F. A digital wa- termark [ C] // Proceedings of the IEEE International Conference on Image Processing. Washington, DC: IEEE Computer Society, 1994, 2:86-90.
  • 2LAI C C, TSAI C C. Digital image watermarking using discrete wavelet transform and singular value decomposition [J]. IEEE Transactions on Instrumentation and Measurement, 2010, 59 ( 11 ) :3060 -3063.
  • 3KASHYAP N, SINHA G R. Image watermarking using 3-level Dis- crete Wavelet Transform (DWT) [ J]. International Journal of Mod- em Education and Computer Science, 2012,4(3):50 -56.
  • 4YADAV S, RAHUL G. Digital watermarking for color images using wavelet transform [ EB/OL]. [ 2015- 01 - 07 ]. http://piserjournal. org/wp-eontent/uploads/2014/05/V13-137 -143. pdf.
  • 5TAO H, ZAIN J M, AHMED M M, et al. A wavelet-based particle swarm optimization algorithm for digital image watermarking [ J]. In- tegrated Computer-Aided Engineering, 2012, 19(1) : 81 - 91.
  • 6ZOPE-CHAUDHARI S, VENKATACHALAM P. Robust copyright pro- tection of raster images using wavelet based digital watermarking [C]// Proceedings of the 2014 IEEE International Geoscienee and Remote Sensing Symposium. Piscataway: IEEE, 2014:3129-3132.
  • 7PREDA R O. Self-recovery of unauthentic images using a new digit- al watermarking approach in the wavelet domain [ C]//Proceedings of the 10th International Conference on Communications. Piscat- away: IEEE, 2014:1 -4.
  • 8MEERWALD P, UHL A. Watermark security via wavelet filter para- metrization [ C]//Proceedings of the IEEE International Conference on Image Processing. Washington, DC: IEEE Computer Society, 2001,3:1027 - 1030.
  • 9WU X, HU J, GU Z, et al. A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parame- ters [ C]//Proceedings of the 2005 Australian Information Security Workshop. Sydney: Australian Computer Society, 2005, 44:75 - 80.
  • 10PIVA A, BARTOLINI F, CALDELLI R. Self recovery authentica- tion of images in the DWT domain [ J]. International Journal of Im- age and Graphics, 2005, 5(1) : 149 - 165.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部