Authentication of images using Zernike moment watermarking

被引:13
|
作者
Shojanazeri, Hamid [1 ]
Adnan, Wan Azizun Wan [2 ]
Ahmad, Sharifah Mumtadzah Syed [2 ]
Rahimipour, Somayeh [2 ]
机构
[1] Univ Putra Malaysia, Dept Comp & Commun Syst Engn, Serdang 43300, Selangor, Malaysia
[2] Univ Putra Malaysia, Serdang, Malaysia
关键词
Watermarking; Image authentication; Authentication; Copyright protection; Multimedia security; Image watermarking; SCHEME; ROTATION; SCALE;
D O I
10.1007/s11042-015-3018-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of the Internet and digital image modification software has invited the illegal access to and use of digital images. In response, digital watermarking has emerged as a unique tool for protecting the authenticity of digital images. This technique involves the insertion of an imperceptible message within the media. This paper proposes a semi-fragile watermarking system using content-based techniques that address the challenge of image authentication. The proposed algorithm exploits the Zernike moments to authenticate an image and the Sobel edge map to perform tamper detection. The main contributions of this work are the establishment of an authentication algorithm that is robust against scaling, translation, noise pollution, rotation and JPEG compression, which are considered to be non-malicious modifications, while significantly decreasing the computational complexity using optimum orders of Zernike moments. In addition, this work addresses the challenge of capacity in terms of watermark insertion while preserving the visual quality of the image, where the capacity is increased almost three fold, as shown in the results. This process can successfully distinguish malicious attacks and reject modifications to watermarked images made through additions, replacements, and image cropping.
引用
收藏
页码:577 / 606
页数:30
相关论文
共 50 条
  • [1] Authentication of images using Zernike moment watermarking
    Hamid Shojanazeri
    Wan Azizun Wan Adnan
    Sharifah Mumtadzah Syed Ahmad
    Somayeh Rahimipour
    Multimedia Tools and Applications, 2017, 76 : 577 - 606
  • [2] Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication
    Liu, Hongmei
    Yao, Xinzhi
    Huang, Jiwu
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [3] Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication
    Hongmei Liu
    Xinzhi Yao
    Jiwu Huang
    EURASIP Journal on Advances in Signal Processing, 2010
  • [4] A robust watermarking technique using Zernike moment and wavelet packet
    Hung, Kuo-Ming
    Wang, Yao-Tien
    Chen, Guaning
    Yeh, Cheng-Hsiang
    WSEAS Transactions on Information Science and Applications, 2007, 4 (05): : 909 - 915
  • [5] Palmprint authentication with Zernike moment invariants
    Pang, YH
    Connie, T
    Jin, ATB
    Ling, DNC
    PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, 2003, : 199 - 202
  • [6] A Zernike Moment Based Rotational Invariant Watermarking Scheme
    Fahmy, M. F.
    Raheem, G. M. Abdel
    Thabet, M. A.
    2013 30TH NATIONAL RADIO SCIENCE CONFERENCE (NRSC2013), 2013, : 228 - 235
  • [7] An Enhanced Bspline Based Zernike Moment Evaluations With Watermarking Applications
    Fahmy, M. F.
    Thabet, M. A.
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 186 - 191
  • [8] Authentication and Tamper Detection in Images Using Dual Watermarking Approach
    Saiyyad, Mohmmad Ali M.
    Patil, Nitin N.
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [9] Secure Authentication Watermarking for Binary Images using Pattern Matching
    Venkatesan, M.
    MeenakshiDevi, P.
    Duraiswamy, K.
    Thyagarajah, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 241 - 250
  • [10] Secure authentication watermarking for binary images
    Kim, HY
    Afif, A
    XVI BRAZILIAN SYMPOSIUM ON COMPUTER GRAPHICS AND IMAGE PROCESSING, PROCEEDINGS, 2003, : 199 - 206