Permutation-Based Semi-Fragile Watermark Scheme

نویسندگان

  • Guorui Feng
  • Ling-ge Jiang
  • Chen He
چکیده

Tamper proofing is a crucial problem in the watermarking application. Aiming at the credibility of multimedia, we present a semi-fragile watermark based on the image permutation. Watermarking detection is performed without resorting to the host image and it is only controlled by secrete keys, thus the whole scheme does not have certain security gaps. The simulation experiments show that it can survive the JPEG compression and effectively specify the region of the image that has been modified maliciously. key words: watermark, tamper proofing, permutation, transform, semifragile

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain

0263-2241/$ see front matter 2012 Elsevier Ltd http://dx.doi.org/10.1016/j.measurement.2012.07.01 E-mail address: [email protected] This paper proposes a novel image authentication scheme in the wavelet domain. The scheme uses a semi-fragile watermark to detect and precisely locate malicious tampering in images. The wavelet coefficients selected for embedding are randomly permuted with a secret...

متن کامل

A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract

Semi-fragile watermark fragile to malicious modifications while robust to incidental manipulations is drawing many attentions in image authentication. However, watermark security has not received enough attention yet. Lifting scheme can construct second generation wavelets. With regard to the first generation wavelets, its implementation is easier, simpler and faster than the Mallat algorithm. ...

متن کامل

Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform

Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conventional watermarking techniques introduce irreversible distortions to the host signals and thus may not be allowable in some applications such as medical and military imaging. Though some reversible fragile authentication algorithms had been developed, reversible semi-fragile authentication pres...

متن کامل

An image fragile watermark scheme based on chaotic image pattern and pixel-pairs

Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has been tampered, and distinguish tampered areas from non-tampered areas without referring to the original digital content. In this paper, a general framework for fragile watermark is proposed, and then a novel fragile w...

متن کامل

A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization

This paper presents a singular-value-based semi-fragile watermarking scheme for image content authentication. The proposed scheme generates secure watermark by performing a logical operation on content-dependent watermark generated by a singular-value-based sequence and contentindependent watermark generated by a private-key-based sequence. It next employs the adaptive quantization method to em...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEICE Transactions

دوره 88-A  شماره 

صفحات  -

تاریخ انتشار 2005