Image Watermarking for Tamper Detection
نویسنده
چکیده
We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from nonmalicious changes resulting from common image processing operations. The technique can be implemented with small memory and computational requirements, which makes it potentially useful for hardware implementation in digital cameras. The technique works by dividing an image into blocks and watermarking each block with a transparent, robust watermark that sensitively depends on a secret key (camera’s ID) and continuously on the image. The watermarking method is a frequency based spread spectrum technique. To achieve a continuous dependency on the image, we propose a special bit extraction procedure that extracts bits from each block by thresholding projections onto key-dependent random smooth patterns. Those bits are then used for initializing a PRNG and synthesizing the spread spectrum signal.
منابع مشابه
Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملReversible Medical Image Watermarking For Tamper Detection And Recovery With Run Length Encoding Compression
Digital watermarking in medical images can ensure the authenticity and integrity of the image. This design paper reviews some existing watermarking schemes and proposes a reversible tamper detection and recovery watermarking scheme. Watermark data from ROI (Region Of Interest) are stored in RONI (Region Of Non Interest). The embedded watermark allows tampering detection and tampered image recov...
متن کاملA Blind Watermarking Scheme for Tamper Detection in Digital Images
The paper proposes a method for tamper proofing digital images using the technique of digital watermarking. Many a times the published images are subject to tampering to an extent that the facts conveyed in the original image are distorted. The mechanism presented here describes a method for detecting the regions in image that were subject to illegal modifications. The method also can detect th...
متن کاملTwo Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...
متن کاملEfficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking
The authentications of digital images have become the center of attentions for certain group of companies since the number of doctored images increased. Tampering the digital images in a way that it’s impossible to be detected by naked eyes has become easier with development of image editing tools. Digital watermarking can preserve the authentication of digital images. In this paper we proposed...
متن کاملTwo Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...
متن کامل