Image Tamper Detection and Recovery Based on Dual Watermarks Sharing Strategy

نویسندگان

  • Yi-Hui Chen
  • Chin-Chen Chang
چکیده

Recently, verifiable secret sharing schemes have been proposed to keep participants from providing fake or illegal stego-images. However, the schemes do not consider the recovery mechanism when parts of the information in stego-images are lost or incidentally modified during the transmission process. This paper presents a novel verifiable and reversible secret sharing scheme based on Shamir’s scheme, which can authenticate the shares in advance and then recover the inauthentic parts to reconstruct the original secret image. The experimental results provided positive results for the feasibility of the proposed scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image Authentication Based on DCT with Recovery Capability

In this paper an image authentication algorithm is proposed where the modified areas in an image are detected, besides an aproximation of the original image, called digest image Cdig, is recovered (recovery capability). Two different watermarks are used. One semi-fragile watermark w1 is used for authentication phase. The digest image Cdig is compressed using an arithmetic code, then redundancy ...

متن کامل

New Multipurpose Oriented Stereo Image Watermarking Algorithm for 3D Multimedia

Most of digital watermarking algorithms have been designed for only single purpose. In this paper, a new multipurpose oriented stereo image watermarking algorithm is proposed for three dimensional multimedia, which can be used for copyright protection, content authentication and tamper detection in three dimensional (3D) multimedia. Specifically, host stereo image is divided into non-overlappin...

متن کامل

Wavelet Based Multipurpose Color Image Watermarking by Using Dual Watermarks with Human Vision System Models

In this study, we propose a complete architecture based on digital watermarking techniques to solve the issue of copyright protection and authentication for digital contents. We apply visible and semi-fragile watermarks as dual watermarks where visible watermarking is used to establish the copyright protection and semi-fragile watermarking authenticates and verifies the innegrity of the waterma...

متن کامل

Semi Fragile Watermark with Self Authentication and Self Recovery

Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks arises from the requirements of content authentication where the watermark must highlight malici...

متن کامل

Towards tamper detection and classification with robust watermarks

In this paper, we present a novel wavelet-based double watermarking system for the detection and subsequent characterisation of the tampering ofimages. Most tamper detection techniques use fragile watermarks. However, our previous work showed that this type of watermark is frequently completely destroyed by compression, which in many cases is undesirable. In addition, it gives little or no info...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JDIM

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2012