Image Authentication and Recovery through Optimal Selection of Block Types
نویسندگان
چکیده
In this letter, we present an authentication and recovery scheme to protect images. The image blocks are DCT transformed and then encoded with different patterns. An optimal selection is adopted to find the best pattern for each block which results in better image quality. Both the recovery and check data are embedded for data protection. The experimental results demonstrate that our method is able to identify and localize regions having been tampered with. Furthermore, good image quality for both watermarked and recovered images are effectively preserved. key words: image authentication, digital watermarking, fragile watermarks, rate-distortion optimization
منابع مشابه
Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملA Semi-Fragile Watermarking Scheme for Color Image Authentication
In this paper, a semi-fragile watermarking scheme is proposed for color image authentication. In this particular scheme, the color image is first transformed from RGB to YST color space, suitable for watermarking the color media. Each channel is divided into 4×4 non-overlapping blocks and its each 2×2 sub-block is selected. The embedding space is created by setting the two LSBs of selected sub-...
متن کاملA Fragile Watermarking Scheme for Color Image Authentication
In this paper, a fragile watermarking scheme is proposed for color image specified object’s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS T ⊥ , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-over...
متن کاملA Fragile Watermarking Scheme for Color Image Authentication
this paper, a fragile watermarking scheme is proposed for color image specified object's authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image and YS T ⊥ , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-overla...
متن کاملEmbedded Semi-Fragile Signature Based Scheme for Ownership Identification and Color Image Authentication with Recovery
In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. The color image is first transformed from RGB to YST color space exclusively designed for watermarking. Followed by color space transformation, each channel is divided into 4×4 non-overlapping blocks with selection of central 2×2 sub-blocks. Dep...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEICE Transactions
دوره 98-A شماره
صفحات -
تاریخ انتشار 2015