VLC-counted watermarking for JPEG image complete authentication

被引:0
|
作者
Zou, FH [1 ]
Lu, ZD [1 ]
Ling, HF [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp & Technol, Wuhan 430074, Peoples R China
关键词
digital watermarking; image authentication; variable length code;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a fragile watermarking algorithm based on look-up table in bit domain. This scheme is simple and with low computational complexity because both watermark embedding and detecting are performed in the lowest domain (bit domain). This scheme can detect and localize alterations of the original image, such as the tampering of images exported from a digital camera. The experimental results show that this scheme has a low visual quality impact and is sensitive to image modification, so it can be used for JPEG image complete authentication.
引用
收藏
页码:1438 / 1441
页数:4
相关论文
共 50 条
  • [21] Color image watermarking robust to JPEG compression
    Puech, W
    Montesinos, P
    Dumas, M
    CGIV'2002: FIRST EUROPEAN CONFERENCE ON COLOUR IN GRAPHICS, IMAGING, AND VISION, CONFERENCE PROCEEDINGS, 2002, : 81 - 85
  • [22] Scalable fragile watermarking for image authentication
    Piper, Angela
    Safavi-Naini, Reihaneh
    IET INFORMATION SECURITY, 2013, 7 (04) : 300 - 311
  • [23] Stereo Image Reversible Watermarking for Authentication
    Luo, Ting
    Jiang, Gangyi
    Peng, Zongju
    Shao, Feng
    Yu, Mei
    3D RESEARCH, 2015, 6 (01)
  • [24] Public watermarking for reversible image authentication
    Gu, Qiaolun
    Gao, Tiegang
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 95 - +
  • [25] Robust Invisible Watermarking for Image Authentication
    Kulkarni, Priyanka R.
    Mulani, Altaaf O.
    Mane, P. B.
    EMERGING TRENDS IN ELECTRICAL, COMMUNICATIONS AND INFORMATION TECHNOLOGIES, 2017, 394 : 193 - 200
  • [26] Biometric image authentication using watermarking
    Lee, Hyobin
    Lim, Jaehyuck
    Yu, Sunjin
    Kim, Sangki
    Lee, Sangyoun
    2006 SICE-ICASE INTERNATIONAL JOINT CONFERENCE, VOLS 1-13, 2006, : 2089 - 2092
  • [27] Watermarking scheme for authentication of compressed image
    Hsieh, TH
    Li, CT
    Wang, S
    MULTIMEDIA SYSTEMS AND APPLICATIONS VI, 2003, 5241 : 1 - 9
  • [28] Blind watermarking applied to image authentication
    Eggers, JJ
    Girod, B
    2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS: VOL I: SPEECH PROCESSING 1; VOL II: SPEECH PROCESSING 2 IND TECHNOL TRACK DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS NEURALNETWORKS FOR SIGNAL PROCESSING; VOL III: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING, 2001, : 1977 - 1980
  • [29] Digital watermarking for image authentication with localization
    Liu, Huajian
    Steinebach, Martin
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 1973 - +
  • [30] A survey of watermarking algorithms for image authentication
    Rey, C
    Dugelay, JL
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2002, 2002 (06) : 613 - 621