A watermarking-based image ownership and tampering authentication scheme

被引:101
|
作者
Chang, CC
Hu, YS
Lu, TC
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
image authentication; watermarking; ownership protection; tampering detection;
D O I
10.1016/j.patrec.2005.09.006
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malicious manipulation over embedded images. In the scheme, the authentication data of an image will be inserted into adaptive least significant bits of the embedded pixels. And the number of the least significant bits will be determined according to the type of the corresponding block. The experimental results show that the quality of the embedded image is very high, and the positions of the tampered parts are located correctly. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:439 / 446
页数:8
相关论文
共 50 条
  • [31] A Reversible Medical Image Watermarking Scheme for Advanced Image Tampering Detection
    Fedoseev V.
    Denisova A.
    [J]. SN Computer Science, 5 (4)
  • [32] Hierarchical multiple image watermarking for image authentication and ownership verification
    Patra, JC
    Ang, KK
    Ang, EL
    [J]. ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 2661 - 2664
  • [33] A SVD-based fragile watermarking scheme for image authentication
    Byun, SC
    Lee, SK
    Tewfik, AH
    Ahn, BH
    [J]. DIGITAL WATERMARKING, 2002, 2613 : 170 - 178
  • [34] Image Authentication Scheme Based on Self-embedding Watermarking
    Cruz-Ramos, Clara
    Reyes-Reyes, Rogelio
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    [J]. PROGRESS IN PATTERN RECOGNITION, IMAGE ANALYSIS, COMPUTER VISION, AND APPLICATIONS, PROCEEDINGS, 2009, 5856 : 1005 - 1012
  • [35] A content-based fragile watermarking scheme for image authentication
    Kim, MA
    Lee, WH
    [J]. CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 258 - 265
  • [36] Superpixel-Based Watermarking Scheme for Image Authentication and Recovery
    Qiao, Xiumei
    Ni, Rongrong
    Zhao, Yao
    [J]. DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 160 - 173
  • [37] A watermarking scheme based on rotating vector for image content authentication
    Fu, Jianjing
    Mao, Jiafa
    Xue, Dawen
    Chen, Deren
    [J]. SOFT COMPUTING, 2020, 24 (08) : 5755 - 5772
  • [38] A watermarking scheme based on rotating vector for image content authentication
    Jianjing Fu
    Jiafa Mao
    Dawen Xue
    Deren Chen
    [J]. Soft Computing, 2020, 24 : 5755 - 5772
  • [39] A New Card Authentication Scheme Based on Image Watermarking and Encryption
    Peng, Xinxin
    Lu, Jianfeng
    Li, Li
    Chang, Chin-Chen
    Zhou, Qili
    [J]. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 358 - 369
  • [40] Wavelet-based fragile watermarking scheme for image authentication
    Li, Chang-Tsun
    Si, Huayin
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2007, 16 (01)