期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Reversible Semi-Fragile Watermarking Technique for Integrity Control of Relational Database
1
作者 Ali Hamadou Abdoul Aziz Issaka Hassane +1 位作者 Lanciné Camara Harouna Naroua 《Engineering(科研)》 2024年第9期309-323,共15页
Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differ... Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differentiate between legal and malicious modifications. In this paper, we introduce a novel lossless semi-fragile scheme based on prediction-error expansion for content protection of relational database. In the proposed method, all attributes in a database relation are first classified according to their sensitivity to legitimate updates. Then, the watermark is embedded by expanding the prediction error of the two least significant digits of securely selected attributes. At watermark extraction, the proposed method has the ability to fully restore the original data while detecting and localizing tampering. The applicability of our method is demonstrated theoretically and experimentally. 展开更多
关键词 semi-fragile Watermarking Integrity Control REVERSIBILITY Prediction-Error Expansion
下载PDF
Semi-Fragile Audio Watermarking Algorithm in DWT Domain 被引量:3
2
作者 LEI Min YANG Yu +1 位作者 LUO Shoushan NIU Xinxin 《China Communications》 SCIE CSCD 2010年第4期71-75,共5页
A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many ... A novel semi-fragile audio watermarking algorithm in DWT domain is proposed in this paper.This method transforms the original audio into 3-layer wavelet domain and divides approximation wavelet coefficients into many groups.Through computing mean quantization of per group,this algorithm embeds the watermark signal into the average value of the wavelet coefficients.Experimental results show that our semi-fragile audio watermarking algorithm is not only inaudible and robust against various common images processing,but also fragile to malicious modification.Especially,it can detect the tampered regions effectively. 展开更多
关键词 semi-fragile Watermarking Wavelet Transform Mean Quantization Tamper Detection
下载PDF
SEMI-FRAGILE WATERMARKING ALGORITHM FOR IMAGE TAMPERS LOCALIZATION AND RECOVERY 被引量:2
3
作者 Jiang Xuemei Liu Quan 《Journal of Electronics(China)》 2008年第3期343-351,共9页
Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localizat... Two watermarks are embedded into the original image. One is the authentication watermark generated by secret key, which is embedded into the sub-LSB (Least Significant Bit) of the original image for tamper localization; the other is the recovery watermark for tamper recovering. The original image is divided into 8 x 8 blocks and each block is transformed by Discrete Cosine Transform (DCT). For each block, some lower frequency DCT coefficients are chosen to be quantized and binary encoded so as to gain the recovery watermark of each block, and the recovery watermark is embedded into the LSB of another block by chaos encryption and authentication chain technology. After the two watermarks being detected, the location of any minute changes in image can be detected, and the tampered image data can be recovered effectively. In the paper, the number of coefficients and their bit lengths are carefully chosen in order to satisfy with the payload of each block and gain the capability of self-recovering. The proposed algorithm can well resist against possible forged attacks. Experimental results show that the watermark generated by the proposed algorithm is sensitive to tiny changes in images, and it has higher accuracy of tamper localization and good capability of the tamper recovery. 展开更多
关键词 Image authentication Tamper localization Image recovery semi-fragile watermark
下载PDF
A new semi-fragile watermarking algorithm for image authentication 被引量:1
4
作者 韩德志 《Journal of Chongqing University》 CAS 2005年第1期41-46,共6页
This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional con... This paper presents a new semi-fragile watermarking algorithm for image authentication which extracts image features from the low frequency domain to generate two watermarks: one for classifying of the intentional content modification and the other for indicating the modified location. The algorithm provides an effective mechanism for image authentication. The watermark generation and watermark embedment are disposed in the image itself, and the received image authentication needs no information about the original image or watermark. The algorithm increases watermark security and prevents forged watermark. Experimental results show that the algorithm can identify intentional content modification and incidental tampering, and also indicate the location where a modification takes place. 展开更多
关键词 AUTHENTICATION semi-fragile watermarking FRAGILITY wavelet transform
下载PDF
Image Authentication Based on Digital Signatureand Semi-Fragile Watermarking 被引量:1
5
作者 Hong-BinZhang ChengYang Xiao-MeiQuan 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期752-759,共8页
This paper proposes an authentication scheme for JPEG images based on digital signature and semi-fragile watermarking. It can detect and locate malicious manipulations made to the image, and verify the ownership of th... This paper proposes an authentication scheme for JPEG images based on digital signature and semi-fragile watermarking. It can detect and locate malicious manipulations made to the image, and verify the ownership of the image at the same time. The algorithm uses the invariance of the order relationship between two DCT coefficients before and after JPEG compression to embed image content dependent watermark, therefore the watermark can survive the JPEG lossy compression. Since the scheme is based on the security of the cryptographic hash function and public key algorithm, it is believed to be secure to the extent that cryptography is believed to be. Theoretical analysis and experimental results show that the proposed scheme has the desired property and good performance for image authentication. 展开更多
关键词 image authentication semi-fragile watermarking JPEG digital signature
原文传递
A Semi-Fragile Wavelet Transform Watermarking Scheme for Content Authentication of Images
6
作者 宋好好 张艳 邹春明 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第5期569-573,共5页
A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform(WT) is presented in this paper.It is tolerant to the embedded wavelet image compression methods based on WT suc... A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform(WT) is presented in this paper.It is tolerant to the embedded wavelet image compression methods based on WT such as embedded zerotree wavelet(EZW) ,set partitioning in hierarchical trees(SPIHT) and embedded block coding with optimized truncation(EBCOT) in JPEG2000 to a pre-determined bit-plane,but is sensitive to all other malicious attacks.The image features are generated from the lowest-frequency(LF) subband of the original image as the embedded watermark.The watermark is embedded into the pre-determined bit-plane by adjusting the corresponding values in the given subband.In the process of watermarking authentication,we compare the image features generated from the LF subband of the received image with the embedded watermarking information(the image features of the original image) extracted from the pre-determined bit-plane in the given subband of the received image to decide whether the image is attacked maliciously or processed acceptably(the embedded wavelet compression) .The most important advantage of our watermarking scheme is that the watermark information can be extracted from the watermarked image when detecting watermark,so the received image authentication needs no information about the original image or watermark.Experimental results prove the effectiveness of our proposed watermarking scheme. 展开更多
关键词 WAVELET image watermarking information security semi-fragile
原文传递
An H.264/AVC Video Watermarking Scheme in VLC Domain for Content Authentication 被引量:1
7
作者 Sun Tanfeng Jiang Xinghao +3 位作者 Lin Zhigao Zhou Yue Lu Huan Wang Shilin 《China Communications》 SCIE CSCD 2010年第6期30-36,共7页
A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses tho... A semi-fragile content authentication algorithm is proposed for low bit-rate H.264/AVC video in VLC domain. Utilizing the intra prediction mode and coded block pattern in VLC domain, the proposed algorithm chooses those macro-blocks from which the signature is extracted and constructs content signature at macro-block level according to the relationship among the energies of quantized low-frequency coefficients of sub-macroblocks. The signature is embedded by modifying the trailing coefficients. The experimental results show that the proposed algorithm performs well in visual quality impact and keep the bit-rate basically unchanged. In addition, the algorithm can embed signatures into I, P, B slices simultaneously and remarkably enhances the watermark capacity. By verifying the extracted signature, the algorithm can detect and locate video tampering efficiently. 展开更多
关键词 H.264/AVC video watermarking content authentication VLC domain semi-fragile watermarking
下载PDF
Wavelet Based Image Authentication and Recovery 被引量:3
8
作者 Rafiullah Chamlaw Asifullah Khan Adnan Idris 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第6期795-804,共10页
In this paper, we propose a secure semi-fragile watermarking technique based on integer wavelet transform with a choice of two watermarks to be embedded. A self-recovering algorithm is employed, that hides the image d... In this paper, we propose a secure semi-fragile watermarking technique based on integer wavelet transform with a choice of two watermarks to be embedded. A self-recovering algorithm is employed, that hides the image digest into some wavelet subbands for detecting possible illicit object manipulation undergone in the image. The semi-fragility makes the scheme tolerant against JPEG lossy compression with the quality factor as low as 70%, and locates the tampered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced by using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees safety of a watermark, recovery of image and localization of tampered area. 展开更多
关键词 semi-fragile watermark integer wavelet transform (IWT) discrete cosine transform (DCT) JPEG compression authentication and self-recovery
原文传递
Robust lossless data hiding scheme 被引量:2
9
作者 Xian-ting ZENG Xue-zeng PAN +1 位作者 Ling-di PING Zhuo LI 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第2期101-110,共10页
This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can s... This paper presents a robust lossless data hiding scheme. The original cover image can be recovered without any distortion after data extraction if the stego-image remains intact, and conversely, the hidden data can still be extracted correctly if the stego-image goes through JPEG compression to some extent. A cover image is divided into a number of non-overlapping blocks, and the arithmetic difference of each block is calculated. By shifting the arithmetic difference value, we can embed bits into the blocks. The shift quantity and shifting rule are fixed for all blocks, and reversibility is achieved. Furthermore, because the bit-0- and bit-1-zones are separated and the particularity of the arithmetic differences, minor changes applied to the stego-image generated by non-malicious attacks such as JPEG compression will not cause the bit-0- and bit-l-zones to overlap, and robustness is achieved. The new embedding mechanism can enhance embedding capacity and the addition of a threshold can make the al- gorithm more robust. Experimental results showed that, compared with previous schemes, the performance of the proposed scheme is significantly improved. 展开更多
关键词 WATERMARKING Lossless data hiding Reversible data hiding Robust lossless data hiding semi-fragile authentication
原文传递
Active Approach for Tamper Detection with Robustness to Lossy Compression
10
作者 李剑 李生红 郑旭平 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第4期385-393,共9页
Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression,... Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tam- pered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. ExperimentM results demonstrate the effectiveness of the proposed scheme. 展开更多
关键词 active tamper detection energy concentration transform error correction code semi-fragile water- marking
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部