A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters Abstract

نویسندگان

  • Xiaoyun Wu
  • Junquan Hu
  • Zhixiong Gu
  • Jiwu Huang
چکیده

Semi-fragile watermark fragile to malicious modifications while robust to incidental manipulations is drawing many attentions in image authentication. However, watermark security has not received enough attention yet. Lifting scheme can construct second generation wavelets. With regard to the first generation wavelets, its implementation is easier, simpler and faster than the Mallat algorithm. In this paper, we propose a novel semi-fragile watermarking scheme for image authentication based on integer wavelet transform with parameters. The features of the proposed scheme are as follows: i) Parameterized integer wavelet transform is constructed. The wavelet base is chosen by a parameter and thus guarantees the security of the watermark. ii) The performance of the generated watermark is improved and the computation complexity is reduced due to the proposed framework of parameterized integer wavelet transform using lifting scheme. iii) The watermark can tolerate JPEG lossy compression as low as quality of 40% while locate the tampered area accurately. To our best knowledge, such performance to resist JPEG compression for semi-fragile watermarking has not been reported in the literature. Experimental results show that the proposed scheme can guarantee the safety of the watermark and locate the tamper area accurately when the image has been suffered from malicious tamper while tolerating JPEG lossy compression to a large extent.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet

With the tremendous amount of images distributed over Internet, image authentication has drawn extensive attention for integrity verification. For instance, watermarking fragile to malicious modifications while robust to data compression has been proposed for image authentication. However, the security of watermark has not received enough attention yet. In this paper, we propose a secure semi-f...

متن کامل

Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform

Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conventional watermarking techniques introduce irreversible distortions to the host signals and thus may not be allowable in some applications such as medical and military imaging. Though some reversible fragile authentication algorithms had been developed, reversible semi-fragile authentication pres...

متن کامل

A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication

This paper proposes a wavelet-based fragile watermarking scheme for secure image authentication. In the proposed scheme, the embedded watermark is generated using the discrete wavelet transform (DWT), and then the improved security watermark by scrambling encryption is embedded into the least significant bit (LSB) of the host image. The proposed algorithm not only possesses excellent tamper loc...

متن کامل

Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication

We propose a content-based semi-fragile watermarking algorithm for image authentication. In content-based watermarking scheme for authentication, one of the most challenging issues is to define a computable feature vector that can capture the major content characteristics. We identify Zernike moments of the image to generate feature vector and demonstrate its good robustness and discriminative ...

متن کامل

Robust and Semi-fragile Watermarking Techniques for Image Content Protection

......................................................................................................................... 2 Acknowledgements ........................................................................................................ 3 1.0 Introduction .............................................................................................................. 4 1.1 Aims and Object...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005