A Blind Watermarking Scheme for Binary Image Authentication

نویسندگان

  • S. Saryazdi
  • H. Nezamabadi
  • A. Hakimi
چکیده

A blind fragile watermarking scheme for binary image authentication is proposed. In authentication watermarking a hidden data is inserted into an image in order to detect any alterations. In the proposed method, the host binary image is first divided into non-overlapping 2 2 sub-blocks. Then, for the last position in each of the blocks, the probability of bit occurrence, conditional to different patterns of its 4-neighborhood, is calculated. The last pixel is predicted using the value of its neighbors. Bit embedding is done by modifying the predicted value instead of the real value. The proposed method is simple, fast, blind, and capable of detecting modifications. Several experiments using text binary images are presented which confirm the effectiveness of the algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An improved hybrid image watermarking scheme in shearlet and wavelet domain

Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cryptography using Image Processing

Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. In this paper, we studied the cheating problem in VC by malicious adversaries. We considered the attacks of malicious adversaries who may deviate from the sc...

متن کامل

Watermarking and authentication of color images based on segmentation of the xyY color space

In this paper we propose a new strategy of watermarking which extends the principle of histogram specification to color histogram. The proposed scheme embeds into a color image a color watermark from either the xy chromatic plane or the xyY color space. The scheme resists geometric attacks (e.g., rotation, scaling, etc.,) and, within some limits, JPEG compression. The scheme uses a secret binar...

متن کامل

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010