A DWT-based fragile watermarking tolerant of JPEG compression

被引:0
|
作者
Hu, JQ [1 ]
Huang, JW
Huang, DR
Shi, YQ
机构
[1] Zhongshan Univ, Sch Informat Sci & Technol, Guangzhou 510275, Peoples R China
[2] New Jersey Inst Technol, Dept ECE, Newark, NJ 07102 USA
来源
DIGITAL WATERMARKING | 2002年 / 2613卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we propose a novel DWT-based fragile watermarking scheme by exploiting the characteristics of the human visual system (HVS). Multi-resolution tamper detection and image fusion are applied to watermark detection and accurate tamper region location. To distinguish between incidental and malicious modifications, some effective rules are presented. Mathematical morphology operations are used to improve the detection performance. Experiment results demonstrate that the watermark is fragile to malicious tamper and robust against high quality lossy image compression.
引用
收藏
页码:179 / 188
页数:10
相关论文
共 50 条
  • [21] DWT-Based Watermarking Using 2DLDA for Color Images
    Pan, I-Hui
    Chang, Te-Jen
    Huang, Ping-Sheng
    JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (07): : 1101 - 1109
  • [22] A DWT-based Image Watermarking Approach using Quantization on Filtered Blocks
    Thien Huynh-The
    Lee, Sungyoung
    Pham-Chi, Hieu
    Thuong Le-Tien
    2014 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC), 2014, : 280 - 285
  • [23] LBP and DWT Based Fragile Watermarking for Image Authentication
    Wang, Chengyou
    Zhang, Heng
    Zhou, Xiao
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (03): : 666 - 679
  • [24] A DWT-based perceptually lossless color image compression architecture
    Marino, F
    Acharya, T
    Karam, LJ
    CONFERENCE RECORD OF THE THIRTY-SECOND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 1998, : 149 - 153
  • [25] A DWT-based Digital Watermarking Scheme for Image Tamper Detection, Localization, and Restoration
    Som, Sukalyan
    Palit, Sarbani
    Dey, Kashinath
    Sarkar, Dipabali
    Sarkar, Jayeeta
    Sarkar, Kheyali
    APPLIED COMPUTATION AND SECURITY SYSTEMS, VOL 2, 2015, 305 : 17 - 37
  • [26] A DWT-Based Rational Dither Modulation Scheme for Effective Blind Audio Watermarking
    Hwai-Tsu Hu
    Ling-Yuan Hsu
    Circuits, Systems, and Signal Processing, 2016, 35 : 553 - 572
  • [27] A DWT-Based Approach with Gradient Analysis for Robust and Blind Medical Image Watermarking
    Hebbache, Khaled
    Khaldi, Belal
    Aiadi, Oussama
    Benziane, Ali
    APPLIED SCIENCES-BASEL, 2024, 14 (14):
  • [28] A secure DWT-based dual watermarking scheme for image authentication and copyright protection
    Hernandez-Joaquin, A.
    Melendez-Melendez, G.
    Cumplido, R.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (27) : 42739 - 42761
  • [29] A secure DWT-based dual watermarking scheme for image authentication and copyright protection
    A. Hernández-Joaquín
    G. Melendez-Melendez
    R. Cumplido
    Multimedia Tools and Applications, 2023, 82 : 42739 - 42761
  • [30] Adaptive DWT-based watermarking scheme using neighboring mean value relationship
    Lou, DC
    Liu, JL
    Chang, MC
    Pan, CC
    Chou, CL
    PROCEEDINGS OF THE 2004 IEEE ASIA-PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, VOL 1 AND 2: SOC DESIGN FOR UBIQUITOUS INFORMATION TECHNOLOGY, 2004, : 589 - 592