期刊文献+

Active Approach for Tamper Detection with Robustness to Lossy Compression

Active Approach for Tamper Detection with Robustness to Lossy Compression
原文传递
导出
摘要 Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tam- pered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. ExperimentM results demonstrate the effectiveness of the proposed scheme. Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tampered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. Experimental results demonstrate the effectiveness of the proposed scheme.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第4期385-393,共9页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China(Nos.61071152 and 61271316) the National Basic Research Program (973) of China(Nos.2010CB731406 and 2013CB329605) the National "Twelfth Five-Year" Plan for Science&Technology Support(No.2012BAH38B04)
关键词 active tamper detection energy concentration transform error correction code semi-fragile water- marking 通信 信号处理 数字信号处理 图像信号处理
  • 相关文献

参考文献10

  • 1Bayram S, Avcibas I, Sankur B, et al. Image manipulation detection [J]. Journal of Electronic Imaging, 2006, 15(4): 041102.
  • 2Zhang X P, Wang S Z. Statistical fragile watermarking capable of locating individual tampered pixels [J]. IEEE Signal Processing Letters, 2007, 14(10): 727-730.
  • 3He H J, Zhang J S, Chen F. A chaos-based fragile watermarking scheme with recovery [C]// Fourth International Conference on Fuzzy Systems and Knowledge Discovery. [s.l.]: IEEE, 2007: 303-307.
  • 4Tsai J S, Huang W B, Chen C L, et al. A featurebased digital image watermarking for copyright protection and content authentication [C]//IEEE International Conference on Image Processing. Texas: IEEE, 2007: 469-472.
  • 5Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication [J]. Proceedings of The IEEE, 1999, 87(7): 1167-1180.
  • 6Zou D K, Shi Y Q, Ni Z C, et al. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(10): 1294-1300.
  • 7Ho A T S. Semi-fragile watermarking and authentication for law enforcement applications [C]//Second International Conference on Innovative Computing Information and Control. Kumamoto: IEEE, 2007: 286.
  • 8Ni Z C, Shi Y Q, Ansari N, et al. Robust lossless image data hiding designed for semi-fragile image authentication [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(4): 497-509.
  • 9Zhang C, Cheng L L, Qiu Z D, et al. Multipurpose watermarking based on multiscale curvelet transform [J]. IEEE Transactions on Information Forensics and Security, 2008, 3(4): 611-619.
  • 10Proakis J G. Digital communications [M]. Zhang Lijun, Zhang Zong-cheng, Zheng Bao-yu, et al. (trans). Beijing: Publishing House of Electronics Industry, The McGraw-Hill Companies Inc., 2001: 353-355 (in Chinese).

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部