A Blind Watermarking Scheme for Binary Image Authentication
نویسندگان
چکیده
A blind fragile watermarking scheme for binary image authentication is proposed. In authentication watermarking a hidden data is inserted into an image in order to detect any alterations. In the proposed method, the host binary image is first divided into non-overlapping 2 2 sub-blocks. Then, for the last position in each of the blocks, the probability of bit occurrence, conditional to different patterns of its 4-neighborhood, is calculated. The last pixel is predicted using the value of its neighbors. Bit embedding is done by modifying the predicted value instead of the real value. The proposed method is simple, fast, blind, and capable of detecting modifications. Several experiments using text binary images are presented which confirm the effectiveness of the algorithm.
منابع مشابه
An improved hybrid image watermarking scheme in shearlet and wavelet domain
Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملA Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cryptography using Image Processing
Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Shares are usually presented in transparencies. Each participant holds a transparency. In this paper, we studied the cheating problem in VC by malicious adversaries. We considered the attacks of malicious adversaries who may deviate from the sc...
متن کاملWatermarking and authentication of color images based on segmentation of the xyY color space
In this paper we propose a new strategy of watermarking which extends the principle of histogram specification to color histogram. The proposed scheme embeds into a color image a color watermark from either the xy chromatic plane or the xyY color space. The scheme resists geometric attacks (e.g., rotation, scaling, etc.,) and, within some limits, JPEG compression. The scheme uses a secret binar...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010