Semi Fragile Watermark with Self Authentication and Self Recovery
نویسندگان
چکیده
Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. The need for semi fragile watermarks arises from the requirements of content authentication where the watermark must highlight malicious attacks while tolerating legitimate changes that do not alter the content severely. Very few watermarking scheme has both self authentication and self recovery features. We developed and evaluated a semi fragile watermarking scheme that offers these features. The scheme embeds a downscaled version of an image into the image’s discrete wavelet transform subbands. Our scheme provides content authentication by allowing high quality JPEG compression, minor local distortion, and minimal noise insertion. Other changes such as histogram equalisation, cropping, rotation, and mean filtering are classified as malicious attacks because it affects the visual quality of the image. The scheme is practical because it does not require a reference image during content authentication. Tampered regions can be located correctly, and its original content can be recovered. The watermark information is secured by a secret key that randomises the watermark pixel positions. The single transform, correlator detector, and down-scaled processing spaces of the scheme offer low computational cost.
منابع مشابه
A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering
This study presents an authentication method with self-recovery ability. The hidden watermark in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers the tampered portion. To increase the ability to recover from tampering, the recovery data are shared by using an (r, n) threshold scheme and then scattered all over the image. Experimental resu...
متن کاملReversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform
Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conventional watermarking techniques introduce irreversible distortions to the host signals and thus may not be allowable in some applications such as medical and military imaging. Though some reversible fragile authentication algorithms had been developed, reversible semi-fragile authentication pres...
متن کاملA Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression
In the past few years, semi-fragile watermarking has become increasingly important to verify the content of images and localise the tampered areas, while tolerating some non-malicious manipulations. Moreover, some researchers proposed self-restoration schemes to recover the tampered area in semi-fragile watermarking schemes. In this paper, we propose a novel fast self-restoration scheme resisti...
متن کاملImage Authentication Based on DCT with Recovery Capability
In this paper an image authentication algorithm is proposed where the modified areas in an image are detected, besides an aproximation of the original image, called digest image Cdig, is recovered (recovery capability). Two different watermarks are used. One semi-fragile watermark w1 is used for authentication phase. The digest image Cdig is compressed using an arithmetic code, then redundancy ...
متن کاملRobust and Semi-fragile Watermarking Techniques for Image Content Protection
......................................................................................................................... 2 Acknowledgements ........................................................................................................ 3 1.0 Introduction .............................................................................................................. 4 1.1 Aims and Object...
متن کامل