The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video ind...The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods.展开更多
This paper proposed a novel fragile watermarking scheme based on singular value decomposition (SVD) and 2D chaotic mapping. It obtains chaotic initial values from the image blocks singular value decomposition and the ...This paper proposed a novel fragile watermarking scheme based on singular value decomposition (SVD) and 2D chaotic mapping. It obtains chaotic initial values from the image blocks singular value decomposition and the user’s key, then uses the chaotic mapping to get the chaotic sequence and inserts the sequence into the LSBs of the image blocks to get the watermarked image blocks. The paper reconstructed the watermarked image from all the embedded blocks. The analysis and experimental results show that the scheme is pretty fragile to tampering, and it can localize the tampering position accurately, reach 3×3 blocks.展开更多
Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a ...Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a logistic chaotic initial value for iteration to create a location matrix. According to this location matrix, a mapping image is generated and the embedding location of watermarking in image blocks is identified. Then, the watermarking sequence, which is related with the mapping image blocks and generated by H6non chaotic map, is embedded into the least significant bit ( LSB ) of the corresponding location in each block. Since the image content and watermarking are staggered, the algorithm has a higher security. Simulation results showed that the algorithm can detect and locate the tamper in watermarked images with an accuracy of 2 × 2 block pixels. At the same time, the watermarking images has good invisibility, and the original image is not required when extracting watermarking.展开更多
Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A t...Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A text watermarking scheme for text document authentication is proposed in this paper. By extracting the features of character cascade together with the user secret key, the scheme combines the features of the text with the user information as a watermark which is embedded into the transformed text itself. The receivers can verify the integrity and the authentication of the text through the blind detection technique. A further research demonstrates that it can also localize the tamper, classify the type of modification, and recover part of modified text documents. The aforementioned conclusion has been proved by both our experiment results and analysis.展开更多
In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coeffi...In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coefficient matrix of the original image and real value chaotic sequences are than used to generate the content based and secure watermark. The watermark is embedded into original image by using HVS. The tamper detection can identify the tampered region of the received watermarked image. Experimental results are given.展开更多
Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking a...Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking are developed respectively in the paper. Concrete algorithms are proposed to prove the models that different Discrete Wavelet Transform (DWT) domains are utilized to embed the watermarks and quanti-zation method is presented with Just Notice Differences (JNDs) threshold as the quantization size. After the key technologies about the two methods are discussed, we detail the comparison of the two modes and rec-ommend their respective application scenarios as applicable results.展开更多
Deep neural networks(DNNs)are widely used in real-world applications,thanks to their exceptional performance in image recognition.However,their vulnerability to attacks,such as Trojan and data poison,can compromise th...Deep neural networks(DNNs)are widely used in real-world applications,thanks to their exceptional performance in image recognition.However,their vulnerability to attacks,such as Trojan and data poison,can compromise the integrity and stability of DNN applications.Therefore,it is crucial to verify the integrity of DNN models to ensure their security.Previous research on model watermarking for integrity detection has encountered the issue of overexposure of model parameters during embedding and extraction of the watermark.To address this problem,we propose a novel score-based black-box DNN fragile watermarking framework called fragile trigger generation(FTG).The FTG framework only requires the prediction probability distribution of the final output of the classifier during the watermarking process.It generates different fragile samples as the trigger,based on the classification prediction probability of the target classifier and a specified prediction probability mask to watermark it.Different prediction probability masks can promote the generation of fragile samples in corresponding distribution types.The whole watermarking process does not affect the performance of the target classifier.When verifying the watermarking information,the FTG only needs to compare the prediction results of the model on the samples with the previous label.As a result,the required model parameter information is reduced,and the FTG only needs a few samples to detect slight modifications in the model.Experimental results demonstrate the effectiveness of our proposed method and show its superiority over related work.The FTG framework provides a robust solution for verifying the integrity of DNN models,and its effectiveness in detecting slight modifications makes it a valuable tool for ensuring the security and stability of DNN applications.展开更多
To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed herein.In this scheme,the image is first partitioned into 2×2 size blocks.Next,the high 5 bits...To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed herein.In this scheme,the image is first partitioned into 2×2 size blocks.Next,the high 5 bits of a block’s average value is embedded into its offset block.The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks.The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering.展开更多
We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different t...We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different to the original watermark, and different kinds of modification lead to different extracted watermarks. In this paper, different kinds of modification are considered as classes, and we used classification algorithm to recognize the modifications with high probability. Simulation results show that the proposed method is potential and effective.展开更多
We propose a novel audio watermarking scheme which can recover the original audio carrier perfectly if the watermarked audio is modified. Besides, we can adjust the maximum tampered rate allowed and the quality of wat...We propose a novel audio watermarking scheme which can recover the original audio carrier perfectly if the watermarked audio is modified. Besides, we can adjust the maximum tampered rate allowed and the quality of watermarked audio flexibly as required. In the scheme, an efficient generalized integer transform is improved to embed watermark data which are composed of least significant bits(LSBs) of averages in each patch, reference-bits and check-bits. LSBs are needed in the inverse transform. Then, by comparing the extracted check-bits and calculated ones, the modified area can be localized. Finally, reliable reference-bits and samples data help us reconstruct the original audio without errors. The efficiency of the proposed method is theoretically and experimentally verified.展开更多
The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterfeiting attacks are conduc...The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterfeiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously.展开更多
文摘The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods.
文摘This paper proposed a novel fragile watermarking scheme based on singular value decomposition (SVD) and 2D chaotic mapping. It obtains chaotic initial values from the image blocks singular value decomposition and the user’s key, then uses the chaotic mapping to get the chaotic sequence and inserts the sequence into the LSBs of the image blocks to get the watermarked image blocks. The paper reconstructed the watermarked image from all the embedded blocks. The analysis and experimental results show that the scheme is pretty fragile to tampering, and it can localize the tampering position accurately, reach 3×3 blocks.
基金The National Science Foundation of China (NSFC) (No.60702025)the Research Fund for the Doctoral Program of Higher Education (RFDP)( No.20070613024)+1 种基金Sichuan Youth Science & Technology Foundation of China (No. 07ZQ026-004)Southwest Jiaotong University Development Foundation (No.2006A04)
文摘Taking full advantage of the randomicity of chaotic system and its extreme sensitivity to the initial value, a new chaotic fragile watermarking algorithm is proposed. In the algorithm, the location key is looked as a logistic chaotic initial value for iteration to create a location matrix. According to this location matrix, a mapping image is generated and the embedding location of watermarking in image blocks is identified. Then, the watermarking sequence, which is related with the mapping image blocks and generated by H6non chaotic map, is embedded into the least significant bit ( LSB ) of the corresponding location in each block. Since the image content and watermarking are staggered, the algorithm has a higher security. Simulation results showed that the algorithm can detect and locate the tamper in watermarked images with an accuracy of 2 × 2 block pixels. At the same time, the watermarking images has good invisibility, and the original image is not required when extracting watermarking.
基金Supported by the National Natural Science Foun-dation of China (60373062 60573045)
文摘Because there are different modification types of deleting characters and inserting characters in text documents, the algorithms for image authentication can not be used for text documents authentication directly. A text watermarking scheme for text document authentication is proposed in this paper. By extracting the features of character cascade together with the user secret key, the scheme combines the features of the text with the user information as a watermark which is embedded into the transformed text itself. The receivers can verify the integrity and the authentication of the text through the blind detection technique. A further research demonstrates that it can also localize the tamper, classify the type of modification, and recover part of modified text documents. The aforementioned conclusion has been proved by both our experiment results and analysis.
文摘In this paper we propose a semi fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by l level discrete wavelet transformation. An approximate wavelet coefficient matrix of the original image and real value chaotic sequences are than used to generate the content based and secure watermark. The watermark is embedded into original image by using HVS. The tamper detection can identify the tampered region of the received watermarked image. Experimental results are given.
文摘Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking are developed respectively in the paper. Concrete algorithms are proposed to prove the models that different Discrete Wavelet Transform (DWT) domains are utilized to embed the watermarks and quanti-zation method is presented with Just Notice Differences (JNDs) threshold as the quantization size. After the key technologies about the two methods are discussed, we detail the comparison of the two modes and rec-ommend their respective application scenarios as applicable results.
基金supported by Research Funders National Natural Science Foundation of China(62172001,U22B2047,62076147).
文摘Deep neural networks(DNNs)are widely used in real-world applications,thanks to their exceptional performance in image recognition.However,their vulnerability to attacks,such as Trojan and data poison,can compromise the integrity and stability of DNN applications.Therefore,it is crucial to verify the integrity of DNN models to ensure their security.Previous research on model watermarking for integrity detection has encountered the issue of overexposure of model parameters during embedding and extraction of the watermark.To address this problem,we propose a novel score-based black-box DNN fragile watermarking framework called fragile trigger generation(FTG).The FTG framework only requires the prediction probability distribution of the final output of the classifier during the watermarking process.It generates different fragile samples as the trigger,based on the classification prediction probability of the target classifier and a specified prediction probability mask to watermark it.Different prediction probability masks can promote the generation of fragile samples in corresponding distribution types.The whole watermarking process does not affect the performance of the target classifier.When verifying the watermarking information,the FTG only needs to compare the prediction results of the model on the samples with the previous label.As a result,the required model parameter information is reduced,and the FTG only needs a few samples to detect slight modifications in the model.Experimental results demonstrate the effectiveness of our proposed method and show its superiority over related work.The FTG framework provides a robust solution for verifying the integrity of DNN models,and its effectiveness in detecting slight modifications makes it a valuable tool for ensuring the security and stability of DNN applications.
基金This work was supported in part by the National Natural Science Foundation of China(No.61401512,61602508,61772549,6141512 and U1636219)the National Key R&D Program of China(No.2016YFB0801303 and 2016QY01W0105)+1 种基金the Key Technologies R&D Program of Henan Province(No.162102210032)the Key Science and Technology Research Project of Henan Province(No.152102210005).
文摘To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed herein.In this scheme,the image is first partitioned into 2×2 size blocks.Next,the high 5 bits of a block’s average value is embedded into its offset block.The tampering type of block is detected by comparing the watermarks of its pre-offset and post-offset blocks.The theoretical analysis and experiments demonstrate that the proposed scheme not only has a lower ratio of false detection but also better performance with regard to avoiding random tampering.
文摘We present a novel watermarking approach based on classification for authentication, in which a watermark is embedded into the host image. When the marked image is modified, the extracted watermark is also different to the original watermark, and different kinds of modification lead to different extracted watermarks. In this paper, different kinds of modification are considered as classes, and we used classification algorithm to recognize the modifications with high probability. Simulation results show that the proposed method is potential and effective.
基金Supported by the National Natural Science Foundation of China(61272414)the Science and Technology Project of Guangzhou of China(2012J4100108)the Jinan University’s Scientific Research Creativeness Cultivation Project for Outstanding Undergraduates Recommended for Postgraduate Study
文摘We propose a novel audio watermarking scheme which can recover the original audio carrier perfectly if the watermarked audio is modified. Besides, we can adjust the maximum tampered rate allowed and the quality of watermarked audio flexibly as required. In the scheme, an efficient generalized integer transform is improved to embed watermark data which are composed of least significant bits(LSBs) of averages in each patch, reference-bits and check-bits. LSBs are needed in the inverse transform. Then, by comparing the extracted check-bits and calculated ones, the modified area can be localized. Finally, reliable reference-bits and samples data help us reconstruct the original audio without errors. The efficiency of the proposed method is theoretically and experimentally verified.
基金the National Natural Science Foundation of China (Grant No. 60572027)the Program for New Century Excellent Talents in University of China (Grant No. NCET-05-0794)+2 种基金the Sichuan Youth Science & Technology Foundation (Grant No. 03ZQ026-033)the National Defense Pre-research Foundation of China (Grant No. 51430804QT2201)the Application Basic Foundation of Sichuan Province, China (Grant No. 2006 J13-10)
文摘The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterfeiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously.