VLC-counted watermarking for JPEG image complete authentication

被引:0
|
作者
Zou, FH [1 ]
Lu, ZD [1 ]
Ling, HF [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp & Technol, Wuhan 430074, Peoples R China
关键词
digital watermarking; image authentication; variable length code;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a fragile watermarking algorithm based on look-up table in bit domain. This scheme is simple and with low computational complexity because both watermark embedding and detecting are performed in the lowest domain (bit domain). This scheme can detect and localize alterations of the original image, such as the tampering of images exported from a digital camera. The experimental results show that this scheme has a low visual quality impact and is sensitive to image modification, so it can be used for JPEG image complete authentication.
引用
下载
收藏
页码:1438 / 1441
页数:4
相关论文
共 50 条
  • [31] Blind watermarking applied to image authentication
    Eggers, JJ
    Girod, B
    2001 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-VI, PROCEEDINGS: VOL I: SPEECH PROCESSING 1; VOL II: SPEECH PROCESSING 2 IND TECHNOL TRACK DESIGN & IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS NEURALNETWORKS FOR SIGNAL PROCESSING; VOL III: IMAGE & MULTIDIMENSIONAL SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING, 2001, : 1977 - 1980
  • [32] Digital watermarking for image authentication with localization
    Liu, Huajian
    Steinebach, Martin
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 1973 - +
  • [33] A survey of watermarking algorithms for image authentication
    Rey, C
    Dugelay, JL
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2002, 2002 (06) : 613 - 621
  • [34] Digital watermarking scheme for image authentication
    Priya, Lakshmi C., V
    Raj, Nelwin N. R.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2026 - 2030
  • [35] Combined watermarking for image authentication and protection
    Lu, CS
    Liao, HYM
    Sze, CJ
    2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, 2000, : 1415 - 1418
  • [36] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [37] Multipurpose watermarking for image authentication and protection
    Lu, CS
    Liao, HYM
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (10) : 1579 - 1592
  • [38] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [39] A robust watermarking and image authentication technique
    Kung, CM
    Truong, K
    Jeng, JH
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 400 - 404
  • [40] A Survey of Watermarking Algorithms for Image Authentication
    Christian Rey
    Jean-Luc Dugelay
    EURASIP Journal on Advances in Signal Processing, 2002