Technology has no limits today;we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own...Technology has no limits today;we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own properties. Insuring digital image integrity has therefore become a major issue. Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. To protect authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in multimedia content authentication. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. In present paper comprehensive overview of insertion and extraction methods used in different semi fragile water marking algorithm are studied using image parameters, potential application, different algorithms are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested.展开更多
A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses tho...A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses those macro-blocks from which the signature is extracted and constructs content signature at macro-block level according to the relationship among the energies of quantized low-frequency coefficients of sub-macroblocks. The signature is embedded by modifying the trailing coefficients. The experimental results show that the proposed algorithm performs well in visual quality impact and keep the bit-rate basically unchanged. In addition, the algorithm can embed signatures into I, P, B slices simultaneously and remarkably enhances the watermark capacity. By verifying the extracted signature, the algorithm can detect and locate video tampering efficiently.展开更多
This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional con...This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place.展开更多
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica...Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models.展开更多
In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing t...In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing the characteristics of the humanvisual system, weembed a digital signal into the average of the four adjacent wavelet coefficients since the mean hasbetter stability than single wavelet coefficient. This method neednt original image when extractsthe watermark. Experimental results show the effectiveness of this method which is robust to commonimage process and fragile to malicious attack.展开更多
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o...A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.展开更多
In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coeffi...In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coefficient matrix of the original image and real value chaotic sequences are than used to generate the content based and secure watermark. The watermark is embedded into original image by using HVS. The tamper detection can identify the tampered region of the received watermarked image. Experimental results are given.展开更多
Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a ...Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a logistic chaotic initial value for iteration to create a location matrix. According to this location matrix, a mapping image is generated and the embedding location of watermarking in image blocks is identified. Then, the watermarking sequence, which is related with the mapping image blocks and generated by H6non chaotic map, is embedded into the least significant bit ( LSB ) of the corresponding location in each block. Since the image content and watermarking are staggered, the algorithm has a higher security. Simulation results showed that the algorithm can detect and locate the tamper in watermarked images with an accuracy of 2 × 2 block pixels. At the same time, the watermarking images has good invisibility, and the original image is not required when extracting watermarking.展开更多
A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that...A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that the t watermarks are generated.Moreover,a new watermark embedding method,using the space geometric model,was proposed,in order to effectively tackle with the mutual influences problem among t watermarks.Specifically,the incidental tampering location,the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks.Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm.展开更多
Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking a...Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking are developed respectively in the paper. Concrete algorithms are proposed to prove the models that different Discrete Wavelet Transform (DWT) domains are utilized to embed the watermarks and quanti-zation method is presented with Just Notice Differences (JNDs) threshold as the quantization size. After the key technologies about the two methods are discussed, we detail the comparison of the two modes and rec-ommend their respective application scenarios as applicable results.展开更多
In the current era, transmission and storing of medical data in the digital form is of great concern and thus the requirement for content authentication has aroused. As a solution to these, digital watermarking techni...In the current era, transmission and storing of medical data in the digital form is of great concern and thus the requirement for content authentication has aroused. As a solution to these, digital watermarking techniques and encryption schemes have been used to secure medical data like medical images. In this paper a combination of two algorithms to provide image authentication for medical images in the compressed format is proposed. In the proposed method, the watermark image is encrypted using the Enhanced modified RC6 block cipher (EMRC6) algorithm and the encrypted watermark image is watermarked using the simple Least significant Bit (LSB) watermarking technique. The watermarked output image shows no visual imparity and the watermark which has been extracted has no visual difference. The test results show that the watermarked image has high quality and the watermark is very secure. Also the PSNR value of proposed method is 44.966 on an average and 43.0633 for the existing system where LSB technique is integrated with MRC6 for security of watermark. Hence the work is aimed to increase the embedding volume and make the watermark more secure which is the basic requirement of medical image security.展开更多
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quanti...A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.展开更多
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a...Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering.展开更多
Hiding data in acid (DNA) can facilitate annotation of important plant the deoxyribose nucleic the authentication and variety rights. A grant of plant variety rights for a new plant variety gives you the exclusive r...Hiding data in acid (DNA) can facilitate annotation of important plant the deoxyribose nucleic the authentication and variety rights. A grant of plant variety rights for a new plant variety gives you the exclusive right to produce for sale and sell propagating material of the variety. Digital watermarking techniques have been proposed for a wide range of applications, including ownership protection, copy control, annotation, and authentication. However, existing data hiding methods for DNA change the functionalities of DNA sequences, which induce morphological changes in biological patterns. This paper proposes a high capacity data hiding scheme for DNA without changing the functionalities of DNA sequences. This scheme adaptively varies the embedding process according to the amount of hidden data. Experimental results show that the proposed scheme gives a significantly improved hiding performance than previous schemes. And the robustness and security issues are also analyzed.展开更多
Digital watermark can be used for image ownership verification orauthentication. In this paper, we propose a new image authentication plan concentrating on itssecurity performance. Digital watermark is first turbo cod...Digital watermark can be used for image ownership verification orauthentication. In this paper, we propose a new image authentication plan concentrating on itssecurity performance. Digital watermark is first turbo coded, sealed and then processed. In waveletdomain. To enhance security level, public key cryptosystem is utilized to replace traditionalwatermark key. Simulation results are finally given by experiment.展开更多
We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different t...We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different to the original watermark, and different kinds of modification lead to different extracted watermarks. In this paper, different kinds of modification are considered as classes, and we used classification algorithm to recognize the modifications with high probability. Simulation results show that the proposed method is potential and effective.展开更多
文摘Technology has no limits today;we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own properties. Insuring digital image integrity has therefore become a major issue. Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents. To protect authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in multimedia content authentication. The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. In present paper comprehensive overview of insertion and extraction methods used in different semi fragile water marking algorithm are studied using image parameters, potential application, different algorithms are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested.
基金This paper is sponsored by the National Natural Science Foundation of China (No. 60802057, 61071153), National 863 Plan of China ( 2009AA01Z407 ), Shanghai Rising-Star Program (10QA1403700), and Shanghai Educational Development Foundation.
文摘A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses those macro-blocks from which the signature is extracted and constructs content signature at macro-block level according to the relationship among the energies of quantized low-frequency coefficients of sub-macroblocks. The signature is embedded by modifying the trailing coefficients. The experimental results show that the proposed algorithm performs well in visual quality impact and keep the bit-rate basically unchanged. In addition, the algorithm can embed signatures into I, P, B slices simultaneously and remarkably enhances the watermark capacity. By verifying the extracted signature, the algorithm can detect and locate video tampering efficiently.
基金Supported by Hi-Tech R&D 863 Program of China (No. 20021111901010) and Scientific Research Fund of Hunan Provincial Education Department (No. 03A033)
文摘This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place.
基金funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Research Groups Program Grant No.(RGP-1443-0051).
文摘Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models.
文摘In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing the characteristics of the humanvisual system, weembed a digital signal into the average of the four adjacent wavelet coefficients since the mean hasbetter stability than single wavelet coefficient. This method neednt original image when extractsthe watermark. Experimental results show the effectiveness of this method which is robust to commonimage process and fragile to malicious attack.
基金Supported bythe National Natural Science Foundationof China (60175001)
文摘A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.
文摘In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coefficient matrix of the original image and real value chaotic sequences are than used to generate the content based and secure watermark. The watermark is embedded into original image by using HVS. The tamper detection can identify the tampered region of the received watermarked image. Experimental results are given.
基金The National Science Foundation of China (NSFC) (No.60702025)the Research Fund for the Doctoral Program of Higher Education (RFDP)( No.20070613024)+1 种基金Sichuan Youth Science & Technology Foundation of China (No. 07ZQ026-004)Southwest Jiaotong University Development Foundation (No.2006A04)
文摘Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a logistic chaotic initial value for iteration to create a location matrix. According to this location matrix, a mapping image is generated and the embedding location of watermarking in image blocks is identified. Then, the watermarking sequence, which is related with the mapping image blocks and generated by H6non chaotic map, is embedded into the least significant bit ( LSB ) of the corresponding location in each block. Since the image content and watermarking are staggered, the algorithm has a higher security. Simulation results showed that the algorithm can detect and locate the tamper in watermarked images with an accuracy of 2 × 2 block pixels. At the same time, the watermarking images has good invisibility, and the original image is not required when extracting watermarking.
基金Project(2012BAH09B02) supported by the National Science and Technology Support Program,ChinaProjects(12JJ3068,12JJ2041) supported by the Natural Science Fundation of Hunan Province,China
文摘A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication.This algorithm is able to extract multiple features from the image wavelet domain,which is based on that the t watermarks are generated.Moreover,a new watermark embedding method,using the space geometric model,was proposed,in order to effectively tackle with the mutual influences problem among t watermarks.Specifically,the incidental tampering location,the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks.Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm.
文摘Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking are developed respectively in the paper. Concrete algorithms are proposed to prove the models that different Discrete Wavelet Transform (DWT) domains are utilized to embed the watermarks and quanti-zation method is presented with Just Notice Differences (JNDs) threshold as the quantization size. After the key technologies about the two methods are discussed, we detail the comparison of the two modes and rec-ommend their respective application scenarios as applicable results.
文摘In the current era, transmission and storing of medical data in the digital form is of great concern and thus the requirement for content authentication has aroused. As a solution to these, digital watermarking techniques and encryption schemes have been used to secure medical data like medical images. In this paper a combination of two algorithms to provide image authentication for medical images in the compressed format is proposed. In the proposed method, the watermark image is encrypted using the Enhanced modified RC6 block cipher (EMRC6) algorithm and the encrypted watermark image is watermarked using the simple Least significant Bit (LSB) watermarking technique. The watermarked output image shows no visual imparity and the watermark which has been extracted has no visual difference. The test results show that the watermarked image has high quality and the watermark is very secure. Also the PSNR value of proposed method is 44.966 on an average and 43.0633 for the existing system where LSB technique is integrated with MRC6 for security of watermark. Hence the work is aimed to increase the embedding volume and make the watermark more secure which is the basic requirement of medical image security.
基金supported by the National Natural Science Foundation of China under Grant No.60702025the Research Fund for the Doctoral Program of Higher Education under Grant No.20070613024Sichuan Youth Science & Technology Foundation under Grant No.07ZQ026-004
文摘A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP.1/147/42),Received by Fahd N.Al-Wesabi.www.kku.edu.sa.
文摘Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication technology.In this paper,a text zero-watermarking approach known as Smart-Fragile Approach based on Soft Computing and Digital Watermarking(SFASCDW)is proposed for content authentication and tampering detection of English text.A first-level order of alphanumeric mechanism,based on hidden Markov model,is integrated with digital zero-watermarking techniques to improve the watermark robustness of the proposed approach.The researcher uses the first-level order and alphanumeric mechanism of Markov model as a soft computing technique to analyze English text.Moreover,he extracts the features of the interrelationship among the contexts of the text,utilizes the extracted features as watermark information,and validates it later with the studied English text to detect any tampering.SFASCDW has been implemented using PHP with VS code IDE.The robustness,effectiveness,and applicability of SFASCDW are proved with experiments involving four datasets of various lengths in random locations using the three common attacks,namely insertion,reorder,and deletion.The SFASCDW was found to be effective and could be applicable in detecting any possible tampering.
基金supported by the National Science Council,Taiwan under Grant No.NSC 99-2221-E-468-007,NSC 99-2221-E-024-010,NSC 99-2221-E-468-021,and NSC 99-2632-E-468-001-MY3
文摘Hiding data in acid (DNA) can facilitate annotation of important plant the deoxyribose nucleic the authentication and variety rights. A grant of plant variety rights for a new plant variety gives you the exclusive right to produce for sale and sell propagating material of the variety. Digital watermarking techniques have been proposed for a wide range of applications, including ownership protection, copy control, annotation, and authentication. However, existing data hiding methods for DNA change the functionalities of DNA sequences, which induce morphological changes in biological patterns. This paper proposes a high capacity data hiding scheme for DNA without changing the functionalities of DNA sequences. This scheme adaptively varies the embedding process according to the amount of hidden data. Experimental results show that the proposed scheme gives a significantly improved hiding performance than previous schemes. And the robustness and security issues are also analyzed.
文摘Digital watermark can be used for image ownership verification orauthentication. In this paper, we propose a new image authentication plan concentrating on itssecurity performance. Digital watermark is first turbo coded, sealed and then processed. In waveletdomain. To enhance security level, public key cryptosystem is utilized to replace traditionalwatermark key. Simulation results are finally given by experiment.
文摘We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different to the original watermark, and different kinds of modification lead to different extracted watermarks. In this paper, different kinds of modification are considered as classes, and we used classification algorithm to recognize the modifications with high probability. Simulation results show that the proposed method is potential and effective.