Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization

نویسندگان

  • Aleksey Zhuvikin
  • Valery I. Korzhik
  • Guillermo Morales-Luna
چکیده

There is a great adventure of watermarking usage in the context of conventional authentication since it does not require additional storage space for supplementary metadata. However JPEG compression, being a conventional method to compress images, leads to exact authentication breaking. We discuss a semi-fragile watermarking system for digital images tolerant to JPEG/JPEG2000 compression. Recently we have published a selective authentication method based on Zernike moments. But unfortunately it has large computational complexity and not sufficiently good detection of small image modifications. In the current paper it is proposed (in contrast to Zernike moments approach) the usage of image finite differences and 3-bit quantization as the main technique. In order to embed a watermark (WM) into the image, some areas of the Haar wavelet transform coefficients are used. Simulation results show a good resistance of this method to JPEG compression with CR ≤ 30% (Compression Ratio), high probability of small image modification recognition, image quality assessments PSNR ≥ 40 (Peak signal-to-noise ratio) dB and SSIM ≥ 0.98 (Structural Similarity Index Measure) after embedding and lower computation complexity of WM embedding and extraction. All these properties qualify this approach as effective. Index Terms Digital images; semi-fragile authentication; central-finite differences; JPEG; JPEG2000; 3-bit hash quantization; Haar-wavelet transform.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantization-based semi-fragile public-key watermarking for secure image authentication

Authentication watermarking approaches can be classified into two kinds: fragile and semi-fragile. In contrast to the latter one, fragile watermarking does not tolerate modifications of any single bit of the watermarked data. Since the transmission of digital data often requires lossy compression, an authentication system should accept non-malicious modifications such as JPEG compression. Semi-...

متن کامل

A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication

This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against...

متن کامل

RST-Invariant Semi-fragile Image Authentication Based on DWT-Coefficient Quantization

In this paper, we propose an image moment-based geometric normalization to be applied before embedding and extracting a digital watermark in the DWT-domain of JPEG2000. A semi-fragile signature, generated from the normalized host signal, afterwards, is embedded for image authentication. The new system is tested extensively and performance results are compared to those of methods proposed by oth...

متن کامل

Semi-fragile Image Authentication Using Real Symmetric Matrix

In order to improve the detection of malicious tampering of images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been distorted incidentally. In this paper, we propose a new semi-fragile digital watermarking technique based on eigenvalues and eigenvectors of real symmetric matrix generated by the pair of four pixels. A signature bit for dete...

متن کامل

A quantization-based semi-fragile watermarking scheme for image content authentication

1047-3203/$ see front matter 2010 Elsevier Inc. A doi:10.1016/j.jvcir.2010.12.005 ⇑ Corresponding author. Fax: +1 435 7973265. E-mail address: [email protected] (X. Qi). This paper presents a novel semi-fragile watermarking scheme for image content authentication with tampering localization. The proposed scheme uses a non-traditional quantization method to modify one chosen approximation coeff...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1608.02291  شماره 

صفحات  -

تاریخ انتشار 2016