Reversible Authentication Watermark for Image

نویسنده

  • Xiaoping Liang
چکیده

(invertible, lossless) authentication draws much attention recently for its ability to restore the original image from marked image without any distortions upon verification. In this paper, we propose a reversible water-marking scheme for image authentication based on histogram modification in integer wavelet transform (IWT) domain. The proposed scheme has features: i) Reversibility, high embedding capacity, and good perceptual invisibility; ii) Tamper localiza-tion and discerning; iii) Detection without requiring explicit knowledge of the original image; iv) Verification before reconstruction of the original image, therefore computational requirements are reduced when reconstruction isn't needed. To our best knowledge, none of the reversible authentication schemes reported in the literature has all of the features. Those features make the proposed scheme practical, effective and appealing for strict content integrity authentication system. Experimental results demonstrate the feasibility and validity of the proposed scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Reversible Image Authentication Scheme Based on Chaotic Fragile Watermark

Although a variety of watermark-based image authentication schemes have been proposed so far, most of them have to leave some permanent distortions in the original image for embedding the watermark information. In this paper, we propose a novel reversible image authentication scheme to allow complete recovery of the cover image after the extraction of the embedded watermark. In the embedding pr...

متن کامل

Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform

Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conventional watermarking techniques introduce irreversible distortions to the host signals and thus may not be allowable in some applications such as medical and military imaging. Though some reversible fragile authentication algorithms had been developed, reversible semi-fragile authentication pres...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

Wavelet-based reversible watermarking for authentication

In the digital information age, digital content (audio, image, and video) can be easily copied, manipulated, and distributed. Copyright protection and content authentication of digital content has become an urgent problem to content owners and distributors. Digital watermarking has provided a valuable solution to this problem. Based on its application scenario, most digital watermarking methods...

متن کامل

Reversible Combined R - DWT - DCT - SVD Watermarking Schema

This paper presents a secure and robust image watermarking scheme based on the reversible DWT-DCT-SVD transformations to increase both integrity authentication and confidentiality. The proposed approach uses two types of watermarks image: a reversible watermark W1 used for verification (integrity and authentication aspects), and a second watermark W2 (a logo image) to verify the confidentiality...

متن کامل

Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermark...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008