Comparison of Zernike and Tchebichef moments for image tampering detection sensitivity and watermark recovery

被引:3
|
作者
Elshoura, S. M. [1 ]
Megherbi, A. B. [1 ]
机构
[1] Univ Massachusetts Lowell, ECE Dept, Ctr Machine Human Intelligence Networking & Distr, Lowell, MA 01854 USA
来源
2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2 | 2008年
关键词
D O I
10.1109/THS.2008.4534524
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The main contribution of this paper is to present an empirical comparative study of Tchebichef and Zernike moments in image watermarking applications. In particular, we consider the case of moment-based watermarking schemes involving watermarks or their moments being hidden in the original image moments. Here, comparisons are in terms of higher image tampering sensitivity and better watermark extraction accuracy. We show that watermarks hidden in the low order Tchebichef moments of a given original image can be extracted and reconstructed with higher accuracy than in the case where they are rather hidden in the low order Zernike moments of the given image. We also show that the Tchebichef moments of a given image are more sensitive to intended or malicious image manipulations than its Zernike moments, and hence are more capable of detecting tampering performed on watermarked images during their transmission.
引用
收藏
页码:615 / 619
页数:5
相关论文
共 41 条
  • [11] Dual watermark for image tamper detection and recovery
    Lee, Tien-You
    Lin, Shinfeng D.
    PATTERN RECOGNITION, 2008, 41 (11) : 3497 - 3506
  • [12] Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery
    Qin, Chuan
    Ji, Ping
    Chang, Chin-Chen
    Dong, Jing
    Sun, Xingming
    IEEE MULTIMEDIA, 2018, 25 (03) : 36 - 48
  • [13] Image Tamper Detection and Recovery Using Dual Watermark
    Song Qiang
    Zhang Hongbin
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [14] An defect detection method based on Zernike Moments for industrial CT image
    Bi Guotang
    Chen Yuansong
    Qin Renchao
    Hu Wei
    ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL II, 2007, : 831 - +
  • [15] Exploring Pseudo-Zernike Moments for Effective Image Forgery Detection
    Patel, Niyati
    Patel, Premal J.
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 351 - 355
  • [16] Self Embedding Fragile Watermarking for Image Tampering Detection and Image Recovery using Self Recovery Blocks
    Dhole, Vinayak S.
    Patil, Nitin N.
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 752 - 757
  • [17] Efficient Image Tamper Detection and Recovery Technique using Dual Watermark
    Chaluvadi, Surya Bhagavan
    Prasad, Munaga V. N. K.
    2009 WORLD CONGRESS ON NATURE & BIOLOGICALLY INSPIRED COMPUTING (NABIC 2009), 2009, : 992 - 997
  • [18] Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks
    Lin, Chu-Hsing
    Liu, Jung-Chun
    Hsu, Wei-Cheng
    Wang, Hsing-Weng
    Lin, Wei-Chih
    Li, Jian-Wei
    ADVANCED COMMUNICATION AND NETWORKING, 2010, 77 : 134 - 143
  • [19] Forensic detection of image manipulation using the Zernike moments and pixel-pair histogram
    Shabanifard, Mahmood
    Shayesteh, Mahrokh G.
    Akhaee, Mohammad Ali
    IET IMAGE PROCESSING, 2013, 7 (09) : 817 - 828
  • [20] Image Forgery Detection Algorithm Based on Non Sampling Wavelet Transform and Zernike Moments
    Xiao Jinke
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 27 - 38