Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication

نویسندگان

  • Hongmei Liu
  • Xinzhi Yao
  • Jiwu Huang
چکیده

We propose a content-based semi-fragile watermarking algorithm for image authentication. In content-based watermarking scheme for authentication, one of the most challenging issues is to define a computable feature vector that can capture the major content characteristics. We identify Zernike moments of the image to generate feature vector and demonstrate its good robustness and discriminative capability for authentication. The watermark is generated by quantizing Zernike moments magnitudes (ZMMs) of the image and embedded into DWT (Discrete Wavelet Transform) subband. It is usually hard to locate the tampered area by using global feature in the content-based watermarking scheme. We propose a structural embedding method to locate the tampered areas by using the separability of Zernike moments-based feature vector. The authentication process does not need the original feature vector. By using the semi-fragilities of the feature vector and the watermark, the proposed authentication scheme is robust to content-preserved processing, while being fragile to malicious attacks. As an application of our algorithm, we apply it on Chinese digital seals and the results show that it works well. Compared with some existing algorithms, the proposed scheme achieves better performance in discriminating high-quality JPEG compression from malicious attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform

Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conventional watermarking techniques introduce irreversible distortions to the host signals and thus may not be allowable in some applications such as medical and military imaging. Though some reversible fragile authentication algorithms had been developed, reversible semi-fragile authentication pres...

متن کامل

Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization

There is a great adventure of watermarking usage in the context of conventional authentication since it does not require additional storage space for supplementary metadata. However JPEG compression, being a conventional method to compress images, leads to exact authentication breaking. We discuss a semi-fragile watermarking system for digital images tolerant to JPEG/JPEG2000 compression. Recen...

متن کامل

Semi-fragile Image Watermarking Using Zernike Moment and Fuzzy C-Means

In order to improve the detection of malicious tampering images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been incidentally distorted. In this paper, we propose a new invariant semi-fragile digital watermarking technique based on eigenvalues and eigenvectors of real symmetric matrix generated by the four pixel pairs. A signature bit for ...

متن کامل

Fast and High Capacity Digital Image Watermarking Technique Based on Phase of Zernike Moments

Zernike Moments (ZMs) are used in many image processing applications, due to their resistance against various signal processing and geometric attacks. Digital image watermarking is one of those application areas, where ZMs are widely used to insert and extract the watermark bits for digital media authentication. In all the existing ZM based watermarking techniques, magnitude of moments is used ...

متن کامل

RST-Invariant Semi-fragile Image Authentication Based on DWT-Coefficient Quantization

In this paper, we propose an image moment-based geometric normalization to be applied before embedding and extracting a digital watermark in the DWT-domain of JPEG2000. A semi-fragile signature, generated from the normalized host signal, afterwards, is embedded for image authentication. The new system is tested extensively and performance results are compared to those of methods proposed by oth...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Adv. Sig. Proc.

دوره 2010  شماره 

صفحات  -

تاریخ انتشار 2010