Comparison of Zernike and Tchebichef moments for image tampering detection sensitivity and watermark recovery

被引:3
|
作者
Elshoura, S. M. [1 ]
Megherbi, A. B. [1 ]
机构
[1] Univ Massachusetts Lowell, ECE Dept, Ctr Machine Human Intelligence Networking & Distr, Lowell, MA 01854 USA
关键词
D O I
10.1109/THS.2008.4534524
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The main contribution of this paper is to present an empirical comparative study of Tchebichef and Zernike moments in image watermarking applications. In particular, we consider the case of moment-based watermarking schemes involving watermarks or their moments being hidden in the original image moments. Here, comparisons are in terms of higher image tampering sensitivity and better watermark extraction accuracy. We show that watermarks hidden in the low order Tchebichef moments of a given original image can be extracted and reconstructed with higher accuracy than in the case where they are rather hidden in the low order Zernike moments of the given image. We also show that the Tchebichef moments of a given image are more sensitive to intended or malicious image manipulations than its Zernike moments, and hence are more capable of detecting tampering performed on watermarked images during their transmission.
引用
收藏
页码:615 / 619
页数:5
相关论文
共 41 条
  • [31] An effective SVD-based image tampering detection and self-recovery using active watermarking
    Dadkhah, Sajjad
    Abd Manaf, Azizah
    Hori, Yoshiaki
    Hassanien, Aboul Ella
    Sadeghi, Somayeh
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (10) : 1197 - 1210
  • [32] A Fragile Watermark Scheme for Image Recovery Based on Singular Value Decomposition, Edge Detection and Median Filter
    Xie, Xuan
    Wang, Chengyou
    Li, Meiling
    APPLIED SCIENCES-BASEL, 2019, 9 (15):
  • [33] Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme
    Oussama Benrhouma
    Houcemeddine Hermassi
    Safya Belghith
    Multimedia Tools and Applications, 2017, 76 : 21133 - 21156
  • [34] Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme
    Benrhouma, Oussama
    Hermassi, Houcemeddine
    Belghith, Safya
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (20) : 21133 - 21156
  • [35] Pixel-based hybrid copy move image forgery detection using Zernike moments and auto colour correlogram
    Bhatia J.K.
    Jalal A.S.
    International Journal of Information and Computer Security, 2021, 15 (01) : 88 - 107
  • [36] Quaternion pseudo-Zernike moments combining both of RGB information and depth information for color image splicing detection
    Chen, Beijing
    Qi, Xiaoming
    Sun, Xingming
    Shi, Yun-Qing
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2017, 49 : 283 - 290
  • [37] A secure image tampering detection and self-recovery scheme using POB number system over cloud
    Xiang, Yanping
    Xiao, Di
    Wang, Hui
    Li, Xinyan
    SIGNAL PROCESSING, 2019, 162 : 282 - 295
  • [38] Edge detection method for unmanned aerial vehicle remote sensing image based on Zernike moments and 2D-Otsu algorithm
    Yang, Yongming
    Fang, Yuanmin
    Huang, Liang
    Electronic Journal of Geotechnical Engineering, 2015, 20 (19): : 11467 - 11475
  • [39] An Image Security System for Digital Private Image Exchange Using Redundant Watermarks for Authentication, Information Hiding, Tampering Detection, and Data Self-Recovery with Partial Carrier Capacity Utilization
    Chaugule, Swapnil S.
    Megherbi, Dalila B.
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 12 - 17
  • [40] Comparison Between K-Nearest Neighbors, Self-organizing Maps and Optimum-Path Forest in the Recognition of Packages using Image Analysis by Zernike Moments
    Carvalho Da Silva, Rodrigo Dalvit
    Coelho, David Nascimento
    Pereira The, George Andre
    Mendonca, Marcel Ribeiro
    2014 11TH IEEE/IAS INTERNATIONAL CONFERENCE ON INDUSTRY APPLICATIONS (INDUSCON), 2014,