Watermarking-based image authentication robust to JPEG compression

被引:28
|
作者
Preda, R. O. [1 ]
Vizireanu, D. N. [1 ]
机构
[1] Univ Politehn Bucuresti, Dept Telecommun, Bucharest, Romania
关键词
FRAGILE WATERMARKING; TAMPER DETECTION;
D O I
10.1049/el.2015.2522
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A watermarking-based image authentication scheme in the discrete cosine transform (DCT) domain robust to JPEG compression is presented. The binary authentication code is generated from a pseudorandom sequence based on a secret key and a block-dependent feature, protecting the scheme against cut-and-paste attacks. The watermark is embedded in low-frequency DCT coefficients selected by the secret key using a modified quantisation index modulation approach. Before embedding, the selected coefficients are quantised using the JPEG quantisation matrix for a selected quality factor, protecting the scheme against JPEG compression with higher quality factors. Experimental results show that the proposed technique achieves very good watermark imperceptibility and is able to detect and locate malicious attacks with good precision. Compared with other existing schemes, the proposed algorithm achieves better performance regarding false positive and false negative detection rates and in discriminating malicious attacks from JPEG compression.
引用
收藏
页码:1873 / 1874
页数:2
相关论文
共 50 条
  • [1] A Survey of Watermarking-Based Authentication for Digital Image
    Lee, Chin-Feng
    Shen, Jau-Ji
    Chen, Zhao-Ru
    [J]. PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 207 - 211
  • [2] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [3] Color image watermarking robust to JPEG compression
    Puech, W
    Montesinos, P
    Dumas, M
    [J]. CGIV'2002: FIRST EUROPEAN CONFERENCE ON COLOUR IN GRAPHICS, IMAGING, AND VISION, CONFERENCE PROCEEDINGS, 2002, : 81 - 85
  • [4] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [5] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [6] The survey of digital watermarking-based image authentication techniques
    Liu, T
    Qiu, ZD
    [J]. 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 1556 - 1559
  • [7] Watermarking-based Color Image Authentication With Detection And Recovery Capability
    Roldan, L. R.
    Hernandez, M. C.
    Chao, J.
    Miyatake, M. N.
    Meana, H. P.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (02) : 1050 - 1057
  • [8] Robust watermarking procedure based on JPEG discrete cosine transform image compression
    Stankovic, Srdjan
    Orovic, Irena
    Zaric, Nikola
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2008, 17 (04)
  • [9] Digital watermarking-based DCT and JPEG model
    Suhail, MA
    Obaidat, MS
    [J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2003, 52 (05) : 1640 - 1647
  • [10] A robust image authentication method surviving JPEG lossy compression
    Lin, CY
    Chang, SF
    [J]. STORAGE AND RETRIEVAL FOR IMAGE AND VIDEO DATABASES VI, 1997, 3312 : 296 - 307