A Comparative Evaluation of Semi-Fragile Watermarking Algorithms
نویسندگان
چکیده
Semi-fragile watermarking techniques aim to prevent tampering and fraudulent use of modified images. A semi-fragile watermark monitors the integrity of the content of the image but not its numerical representation. Therefore the watermark is designed so that the integrity is proven if the content of the image has not been tampered with, despite some mild processing on the image. However if parts of the image are replaced with the wrong key or are heavily processed, the watermark information should indicate evidence of forgery. In this paper we compare the performance of eight semi-fragile watermarking algorithms in terms of their miss probability under forgery attack, and in terms of false alarm probability under non-malicious signal processing operations that preserve the content and quality of the image. We propose desiderata for semi-fragile watermarking algorithms and indicate the promising algorithms among existing ones.
منابع مشابه
Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to ...
متن کاملReversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform
Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conventional watermarking techniques introduce irreversible distortions to the host signals and thus may not be allowable in some applications such as medical and military imaging. Though some reversible fragile authentication algorithms had been developed, reversible semi-fragile authentication pres...
متن کاملRobust and Semi-fragile Watermarking Techniques for Image Content Protection
......................................................................................................................... 2 Acknowledgements ........................................................................................................ 3 1.0 Introduction .............................................................................................................. 4 1.1 Aims and Object...
متن کاملFragile Watermarking for Image Authentication: Survey
In this paper, we report results from comparative study on various related and relevant aspects of the digital watermarking such as image authentication techniques using fragile watermarking, fuzzy clustering and genetically inspired watermarking techniques for integrity verification. This is carried out with intent to develop an understanding of their working, contained challenges, possible at...
متن کاملFRAGILE and SEMI - FRAGILE WATERMARKING TECHNIQUES for IMAGE AUTHENTICATION
Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The frag...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003