Authentication of images using Zernike moment watermarking

被引:13
|
作者
Shojanazeri, Hamid [1 ]
Adnan, Wan Azizun Wan [2 ]
Ahmad, Sharifah Mumtadzah Syed [2 ]
Rahimipour, Somayeh [2 ]
机构
[1] Univ Putra Malaysia, Dept Comp & Commun Syst Engn, Serdang 43300, Selangor, Malaysia
[2] Univ Putra Malaysia, Serdang, Malaysia
关键词
Watermarking; Image authentication; Authentication; Copyright protection; Multimedia security; Image watermarking; SCHEME; ROTATION; SCALE;
D O I
10.1007/s11042-015-3018-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of the Internet and digital image modification software has invited the illegal access to and use of digital images. In response, digital watermarking has emerged as a unique tool for protecting the authenticity of digital images. This technique involves the insertion of an imperceptible message within the media. This paper proposes a semi-fragile watermarking system using content-based techniques that address the challenge of image authentication. The proposed algorithm exploits the Zernike moments to authenticate an image and the Sobel edge map to perform tamper detection. The main contributions of this work are the establishment of an authentication algorithm that is robust against scaling, translation, noise pollution, rotation and JPEG compression, which are considered to be non-malicious modifications, while significantly decreasing the computational complexity using optimum orders of Zernike moments. In addition, this work addresses the challenge of capacity in terms of watermark insertion while preserving the visual quality of the image, where the capacity is increased almost three fold, as shown in the results. This process can successfully distinguish malicious attacks and reject modifications to watermarked images made through additions, replacements, and image cropping.
引用
收藏
页码:577 / 606
页数:30
相关论文
共 50 条
  • [21] Face recognition using Zernike and complex Zernike moment features
    Singh C.
    Mittal N.
    Walia E.
    Pattern Recognition and Image Analysis, 2011, 21 (01) : 71 - 81
  • [22] Watermarking Algorithm for Authentication and Self-Recovery of Tampered Images Using DWT
    Molina-Garcia, Javier
    Reyes-Reyes, Rogelio
    Ponomaryov, Volodymyr
    Cruz-Ramos, Clara
    2016 9TH INTERNATIONAL KHARKIV SYMPOSIUM ON PHYSICS AND ENGINEERING OF MICROWAVES, MILLIMETER AND SUBMILLIMETER WAVES (MSMW), 2016,
  • [23] A Semi-blind Watermarking Method for Authentication of Face Images Using Autoencoders
    Khalilidan, Saeed
    Mandavi, Mojtaba
    Balouchestani, Arian
    Moti, Zahra
    Hallaj, Yeganeh
    2020 6TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2020, : 229 - 233
  • [24] Digital Watermarking System for Copyright Protection and Authentication of Images Using Cryptographic Techniques
    Sanivarapu, Prasanth Vaidya
    Rajesh, Kandala N. V. P. S.
    Hosny, Khalid M.
    Fouda, Mostafa M.
    APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [25] Binary image authentication using zernike moments
    Liu, Hongmei
    Rui, Wei
    Huang, Jiwu
    2007 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-7, 2007, : 385 - 388
  • [26] A public-key authentication watermarking for binary images
    Kim, HY
    de Queiroz, RL
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 3459 - 3462
  • [27] Novel reversible watermarking scheme for authentication of military images
    Yamuna, Govindarajan
    Sivakumar, Dakshinamurthi
    INTERNATIONAL JOURNAL OF SIGNAL AND IMAGING SYSTEMS ENGINEERING, 2009, 2 (03) : 134 - 140
  • [28] Authentication of biomedical images based on zero location watermarking
    Ho, ATS
    Zhu, XZ
    Shen, J
    2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 973 - 976
  • [29] Alteration-locating authentication watermarking for binary images
    Kim, HY
    de Queiroz, RL
    DIGITAL WATERMARKING, 2005, 3304 : 125 - 136
  • [30] A Lossless Watermarking Based Authentication System For Medical Images
    Boucherkha, Samia
    Bemnohamed, Mohamed
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 1, 2007, 1 : 100 - 103