A watermarking-based image ownership and tampering authentication scheme

被引:101
|
作者
Chang, CC
Hu, YS
Lu, TC
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
image authentication; watermarking; ownership protection; tampering detection;
D O I
10.1016/j.patrec.2005.09.006
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malicious manipulation over embedded images. In the scheme, the authentication data of an image will be inserted into adaptive least significant bits of the embedded pixels. And the number of the least significant bits will be determined according to the type of the corresponding block. The experimental results show that the quality of the embedded image is very high, and the positions of the tampered parts are located correctly. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:439 / 446
页数:8
相关论文
共 50 条
  • [41] A watermarking scheme based on rotating vector for image content authentication
    Jianjing Fu
    Jiafa Mao
    Dawen Xue
    Deren Chen
    [J]. Soft Computing, 2020, 24 : 5755 - 5772
  • [42] Wavelet-based fragile watermarking scheme for image authentication
    Li, Chang-Tsun
    Si, Huayin
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2007, 16 (01)
  • [43] A content based image watermarking scheme for authentication using quadtrees
    Parameswaran, Latha
    Anburnani, K.
    [J]. 2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 146 - +
  • [44] A SECURE IMAGE AUTHENTICATION SCHEME WITH TAMPERING PROOF AND REMEDY BASED ON HAMMING CODE
    Lin, Ren-Der
    Chen, Tzung-Her
    Huang, Chien-Chen
    Lee, Wei-Bin
    Chen, Wen-Shyen E.
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (09): : 2603 - 2617
  • [45] Priority Watermarking-Based Face-Fingerprint Authentication System
    Tuan Hoang
    Tran, Dat
    Sharma, Dharmendra
    Le, Trung
    Le, Bac H.
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, : 235 - +
  • [46] Watermarking-based Self-Recovery and Authentication Framework for Colour Images
    Molina, J.
    Ponomaryov, V.
    Reyes, R.
    Cruz, C.
    [J]. 2019 7TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF), 2019,
  • [47] Watermarking-Based Image Inpainting Using Halftoning Technique
    Hung, Kuo-Ming
    Hsieh, Ching-Tang
    Yeh, Cheng-Hsiang
    Chen, Li-Ming
    [J]. JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2012, 15 (01): : 79 - 88
  • [48] A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering
    Yu-Jie Chang
    Ran-Zan Wang
    Ja-Chen Lin
    [J]. EURASIP Journal on Advances in Signal Processing, 2008
  • [49] Tampering attacks on binary phase only filter-based watermarking schemes for image authentication
    Cao, Gang
    Zhao, Yao
    Ni, Rongrong
    [J]. OPTICAL ENGINEERING, 2011, 50 (05)
  • [50] A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering
    Chang, Yu-Jie
    Wang, Ran-Zan
    Lin, Ja-Chen
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008, 2008 (1)