A digital authentication watermarking scheme for JPEG images with superior localization and security

被引:0
|
作者
YU Miao
机构
基金
国防预研究基金; 中国国家自然科学基金;
关键词
fragile watermarking; JPEG compression; localization accuracy; collage attack;
D O I
暂无
中图分类号
TN919.81 [图像编码]; TN918 [通信保密与通信安全];
学科分类号
0810 ; 081001 ; 0839 ; 1402 ;
摘要
The drawbacks of the current authentication watermarking schemes for JPEG images, which are inferior localization and the security flaws, are firstly analyzed in this paper. Then, two counterfeiting attacks are conducted on them. To overcome these drawbacks, a new digital authentication watermarking scheme for JPEG images with superior localization and security is proposed. Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately. For each image block, the proposed scheme keeps four middle frequency points fixed to embed the watermark, and utilizes the rest of the DCT coefficients to generate 4 bits of watermark information. During the embedding process, each watermark bit is embedded in another image block that is selected by its corresponding secret key. Since four blocks are randomly selected for the watermark embedding of each block, the non-deterministic dependence among the image blocks is established so as to resist collage attack completely. At the receiver, according to judging of the extracted 4 bits of watermark information and the corresponding 9-neighbourhood system, the proposed scheme could discriminate whether the image block is tampered or not. Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process. Theoretic analysis and simulation results have proved that the proposed algorithm not only has superior localization, but also enhances the systematic security obviously.
引用
收藏
页码:491 / 509
页数:19
相关论文
共 50 条
  • [21] A restorable fragile watermarking scheme with superior localization for both natural and text images
    Hemida, Omer
    Huo, Yaoran
    He, Hongjie
    Chen, Fan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (09) : 12373 - 12403
  • [22] An improved digital watermarking technique for protecting JPEG images
    Noore, A
    [J]. ICCE: 2003 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, 2003, : 222 - 223
  • [23] A new personal authentication method using a lossless digital watermarking scheme for hand images
    Lu, Ying-Hua
    Qin, Jing
    Qi, Shuang
    [J]. 2007 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, VOLS 1-4, PROCEEDINGS, 2007, : 1870 - 1875
  • [24] A multi-feature based invertible authentication watermarking for JPEG images
    Ye, DP
    Mao, YB
    Dai, YW
    Wang, ZQ
    [J]. DIGITAL WATERMARKING, 2005, 3304 : 152 - 162
  • [25] Watermarking scheme for copyright of digital images
    Baba, Sami
    Krekor, Lala
    Arif, Thawar
    Shaaban, Zyad
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04): : 1 - 9
  • [26] A Tampering Authentication Algorithm for JPEG Image Based on Adaptive Digital Watermarking
    Liu, Guang-qi
    Zheng, Xiao-shi
    Zhao, Yan-ling
    Yang, Cheng-zhong
    Ding, Yuan-yu
    Liao, Lu-fang
    [J]. 2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 1, 2011, : 332 - 335
  • [27] A reversible watermarking scheme for JPEG-2000 compressed images
    Emmanuel, S
    Kiang, HC
    Das, A
    [J]. 2005 IEEE International Conference on Multimedia and Expo (ICME), Vols 1 and 2, 2005, : 69 - 72
  • [28] Novel reversible watermarking scheme for authentication of military images
    Yamuna, Govindarajan
    Sivakumar, Dakshinamurthi
    [J]. INTERNATIONAL JOURNAL OF SIGNAL AND IMAGING SYSTEMS ENGINEERING, 2009, 2 (03) : 134 - 140
  • [29] A Reversible and Imperceptible Watermarking Scheme for MR Images Authentication
    Qasim, Asaad F.
    Meziane, Farid
    Aspin, Rob
    [J]. 2018 24TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC' 18), 2018, : 95 - 100
  • [30] Content Authentication Based on JPEG-to-JPEG Watermarking
    Hong-Xia Wang
    [J]. Journal of Electronic Science and Technology, 2009, 7 (02) : 125 - 128