A multiple watermarks algorithm for image content authentication

被引:4
|
作者
Cai Li-jun [1 ]
Li Rui [1 ]
Yi Ye-qing [1 ]
机构
[1] Hunan Univ, Coll Informat Sci & Engn, Changsha 410082, Hunan, Peoples R China
关键词
multiple watermarks; cooperation authentication; wavelet transform; image wavelet domain; intentional content tampering; incidental modification;
D O I
10.1007/s11771-012-1353-2
中图分类号
TF [冶金工业];
学科分类号
0806 ;
摘要
A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication. This algorithm is able to extract multiple features from the image wavelet domain, which is based on that the t watermarks are generated. Moreover, a new watermark embedding method, using the space geometric model, was proposed, in order to effectively tackle with the mutual influences problem among t watermarks. Specifically, the incidental tampering location, the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks. Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm.
引用
收藏
页码:2866 / 2874
页数:9
相关论文
共 50 条
  • [1] A multiple watermarks algorithm for image content authentication
    蔡立军
    李睿
    易叶青
    [J]. Journal of Central South University, 2012, 19 (10) : 2866 - 2874
  • [2] A multiple watermarks algorithm for image content authentication
    Li-jun Cai
    Rui Li
    Ye-qing Yi
    [J]. Journal of Central South University, 2012, 19 : 2866 - 2874
  • [3] Color Image Authentication using dual watermarks
    Gull, Solihah
    Parah, Shabir A.
    [J]. 2019 FIFTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP 2019), 2019, : 240 - 245
  • [4] Using entropy for image and video authentication watermarks
    Thiemert, S
    Sahbi, H
    Steinebach, M
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [5] Authentication and recovery of images using multiple watermarks
    Chamlawi, Rafiullah
    Khan, Asifullah
    Usman, Imran
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) : 578 - 584
  • [6] Image authentication and integrity verification via content-based watermarks and a public key cryptosystem
    Li, CT
    Lou, DC
    Chen, TH
    [J]. 2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2000, : 694 - 697
  • [7] An embedding algorithm for multiple watermarks
    Shieh, CS
    Huang, HC
    Wang, FH
    Pan, JS
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2003, 19 (02) : 381 - 395
  • [8] 2D barcodes as watermarks in image authentication
    Premaratne, Prashan
    Safaei, Farzad
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 432 - +
  • [9] A Secure Perceptual Hash Algorithm for Image Content Authentication
    Weng, Li
    Preneel, Bart
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 108 - 121
  • [10] Genetic algorithm audio watermarking using multiple image-based watermarks
    Ketcham, Mahasak
    Vongpraphip, Sartid
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1235 - 1240