Using entropy for image and video authentication watermarks

被引:3
|
作者
Thiemert, S [1 ]
Sahbi, H [1 ]
Steinebach, M [1 ]
机构
[1] Fraunhofer IPSI, Darmstadt, Germany
关键词
video authentication; image authentication; integrity protection; entropy; semi-fragile watermarking;
D O I
10.1117/12.643053
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are several scenarios where the integrity of digital images and videos has to be verified. Examples can be found in videos captured by surveillance cameras. In this paper we propose a semi-fragile watermarking scheme, which can be applied on still images as well as on digital videos. We concentrate on the protection of I-frames in compressed MPEG-1/2 videos. We use the entropy of the probability distribution of gray level values in block groups to generate a binary feature mask, which is embedded robustly into an adjacent I-frame. The approach can distinguish between content-preserving and content-changing manipulations. Positions of content-changing manipulations can be localized. We provide experimental results to analyze the effectiveness of the scheme. In the evaluation part we concentrate on the robustness against content-preserving and the sensitivity to content-changing manipulations.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Color Image Authentication using dual watermarks
    Gull, Solihah
    Parah, Shabir A.
    [J]. 2019 FIFTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP 2019), 2019, : 240 - 245
  • [2] IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS
    Qi, Xiaojun
    Xin, Xing
    Chang, Ran
    [J]. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 4257 - 4260
  • [3] Image authentication using hierarchical semi-fragile watermarks
    Tang, Yuan-Liang
    Chen, Chun-Hung
    [J]. E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2006, : 241 - +
  • [4] A multiple watermarks algorithm for image content authentication
    蔡立军
    李睿
    易叶青
    [J]. Journal of Central South University, 2012, 19 (10) : 2866 - 2874
  • [5] Restoration in secure text document image authentication using erasable watermarks
    Puhan, NB
    Ho, ATS
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 661 - 668
  • [6] A multiple watermarks algorithm for image content authentication
    Cai Li-jun
    Li Rui
    Yi Ye-qing
    [J]. JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2012, 19 (10) : 2866 - 2874
  • [7] A multiple watermarks algorithm for image content authentication
    Li-jun Cai
    Rui Li
    Ye-qing Yi
    [J]. Journal of Central South University, 2012, 19 : 2866 - 2874
  • [8] Digital signatures based on invertible watermarks for video authentication
    Hauer, E
    Dittmann, J
    Steinebach, M
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 3677 : 277 - 279
  • [9] 2D barcodes as watermarks in image authentication
    Premaratne, Prashan
    Safaei, Farzad
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 432 - +
  • [10] Authentication and recovery of images using multiple watermarks
    Chamlawi, Rafiullah
    Khan, Asifullah
    Usman, Imran
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) : 578 - 584