A watermarking-based image ownership and tampering authentication scheme

被引:101
|
作者
Chang, CC
Hu, YS
Lu, TC
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
image authentication; watermarking; ownership protection; tampering detection;
D O I
10.1016/j.patrec.2005.09.006
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malicious manipulation over embedded images. In the scheme, the authentication data of an image will be inserted into adaptive least significant bits of the embedded pixels. And the number of the least significant bits will be determined according to the type of the corresponding block. The experimental results show that the quality of the embedded image is very high, and the positions of the tampered parts are located correctly. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:439 / 446
页数:8
相关论文
共 50 条
  • [1] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [2] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [3] A Survey of Watermarking-Based Authentication for Digital Image
    Lee, Chin-Feng
    Shen, Jau-Ji
    Chen, Zhao-Ru
    [J]. PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 207 - 211
  • [4] A watermarking-based authentication and recovery scheme for encrypted audio
    Zhenghui Liu
    Yi Cao
    Kejia Lin
    [J]. Multimedia Tools and Applications, 2024, 83 : 10969 - 10987
  • [5] A watermarking-based authentication and recovery scheme for encrypted audio
    Liu, Zhenghui
    Cao, Yi
    Lin, Kejia
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (04) : 10969 - 10987
  • [6] Fragile Watermarking-based Authentication Scheme for Demosaicked Images
    Lin, Chia-Chen
    Liu, Xiao-Long
    Lin, Cheng-Han
    Yuan, Shyan-Ming
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 97 - 100
  • [7] Watermarking-based image authentication robust to JPEG compression
    Preda, R. O.
    Vizireanu, D. N.
    [J]. ELECTRONICS LETTERS, 2015, 51 (23) : 1873 - 1874
  • [8] The survey of digital watermarking-based image authentication techniques
    Liu, T
    Qiu, ZD
    [J]. 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 1556 - 1559
  • [9] A Watermarking-Based Medical Image Integrity Control System and an Image Moment Signature for Tampering Characterization
    Coatrieux, Gouenou
    Huang, Hui
    Shu, Huazhong
    Luo, Limin
    Roux, Christian
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2013, 17 (06) : 1057 - 1067
  • [10] Watermarking-based Color Image Authentication With Detection And Recovery Capability
    Roldan, L. R.
    Hernandez, M. C.
    Chao, J.
    Miyatake, M. N.
    Meana, H. P.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (02) : 1050 - 1057