FEATURE BASED WATERMARKING SCHEME FOR IMAGE AUTHENTICATION

被引:5
|
作者
Liu, Hongmei [1 ]
Rao, Junhui [1 ]
Yao, Xinzhi [1 ]
机构
[1] Sun Yat Sen Univ, Dept Elect & Commun, Guangzhou 510275, Guangdong, Peoples R China
关键词
Image Authentication; Zernike moments; content based watermark; semi-fragile;
D O I
10.1109/ICME.2008.4607413
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Our previous paper [1] proposed to use Zernike moments magnitudes (ZMMs) of the image for authentication. We demonstrated the good robustness and discriminative capability of this feature vector and proposed a structure embedding method for the watermark generated from this feature vector to locate the tampered area. In this paper, we extend and improve the algorithm in [1] in the following ways: 1) embedding watermark in an image will affect its feature vector, we split the original image into several spaces randomly, one for generating feature vector, one for embedding ZMM based watermark. Thus, we can remove the effect of watermarking itself on the feature vector generating, 2) presenting a two-stage authentication method and improve the discriminating capability of the authentication. Compared with the existing approaches, the proposed scheme has better performance of discriminating high quality JPEG compression from malicious manipulations.
引用
收藏
页码:229 / 232
页数:4
相关论文
共 50 条
  • [1] A feature-watermarking scheme for JPEG image authentication
    Wang, JS
    Dai, YW
    Thiemert, S
    Wang, ZQ
    [J]. DIGITAL WATERMARKING, 2004, 2939 : 212 - 222
  • [2] Watermarking based image authentication using feature amplification
    Ye, SM
    Chang, EC
    Sun, QB
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 610 - 613
  • [3] Content-based watermarking scheme for image authentication
    Yu, SS
    Hu, YP
    Zhou, JL
    [J]. 2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 1083 - 1087
  • [4] Image authentication and recovery scheme based on watermarking technique
    Sumitomo, Kenji
    Nakano, Mariko
    Perez, Hector
    [J]. PROCEEDINGS OF THE 2ND WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: MODERN TOPICS OF COMPUTER SCIENCE, 2008, : 94 - +
  • [5] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [6] Watermarking scheme for authentication of compressed image
    Hsieh, TH
    Li, CT
    Wang, S
    [J]. MULTIMEDIA SYSTEMS AND APPLICATIONS VI, 2003, 5241 : 1 - 9
  • [7] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    [J]. ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [8] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    [J]. 2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [9] Digital watermarking scheme for image authentication
    Priya, Lakshmi C., V
    Raj, Nelwin N. R.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2026 - 2030
  • [10] An image authentication scheme based on digital watermarking and image secret sharing
    Hsieh, Shang-Lin
    Tsai, I-Ju
    Yeh, Chung-Ping
    Chang, Chia-Ming
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) : 597 - 619