Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery

被引:76
|
作者
Qin, Chuan [1 ]
Ji, Ping [2 ]
Chang, Chin-Chen [3 ]
Dong, Jing [4 ]
Sun, Xingming [5 ]
机构
[1] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai, Peoples R China
[2] Univ Shanghai Sci & Technol, Signal & Informat Proc, Shanghai, Peoples R China
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung, Taiwan
[4] Chinese Acad Sci, Inst Automat, Beijing, Peoples R China
[5] Nanjing Univ Informat Sci & Technol, Coll Comp & Software, Nanjing, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
EMBEDDING FRAGILE WATERMARKING;
D O I
10.1109/MMUL.2018.112142509
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Self-embedding watermarking can be used for image tampering recovery. In this work, the authors proposed a new image self-embedding scheme based on optimal iterative block truncation coding and non-uniform watermark sharing. Experimental results demonstrate that the proposed scheme can achieve better performance of tampering recovery than some of state-of-the-art schemes.
引用
收藏
页码:36 / 48
页数:13
相关论文
共 50 条
  • [1] ZERO-WATERMARK METHOD BASED ON NON-UNIFORM BTC PARTITION
    Li, Yichen
    Kintak, U.
    PROCEEDINGS OF 2021 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2021, : 91 - 96
  • [2] DEEP IMAGE COMPRESSION WITH ITERATIVE NON-UNIFORM QUANTIZATION
    Cai, Jianrui
    Zhang, Lei
    2018 25TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2018, : 450 - 454
  • [3] Non-uniform MR image reconstruction based on Non-Uniform FFT
    Liang xiao-yun
    Zeng wei-ming
    Dong zhi-hua
    Zhang zhi-jiang
    Luo li-min
    27TH INTERNATIONAL CONGRESS ON HIGH SPEED PHOTOGRAPHY AND PHOTONICS, PRTS 1-3, 2007, 6279
  • [4] Comparison of Zernike and Tchebichef moments for image tampering detection sensitivity and watermark recovery
    Elshoura, S. M.
    Megherbi, A. B.
    2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2, 2008, : 615 - 619
  • [5] Uniform and Non-Uniform Image Enlargement Based on the Window Kernel
    Somawirata, I. Komang
    Hartono, Bambang Prio
    Herbasuki, Teguh
    Soetedjo, Aryuato
    3RD INTERNATIONAL CONFERENCE ON ELECTRICAL SYSTEMS, TECHNOLOGY AND INFORMATION (ICESTI 2017), 2018, 164
  • [6] Image representation by a new optimal non-uniform morphological sampling
    Saryazdi, S
    Haese-Coat, V
    Ronsin, J
    PATTERN RECOGNITION, 2000, 33 (06) : 961 - 977
  • [7] Non-uniform frequency domain for optimal exploitation of non-uniform sampling
    Kazimierczuk, Krzysztof
    Zawadzka-Kazimierczuk, Anna
    Kozminski, Wiktor
    JOURNAL OF MAGNETIC RESONANCE, 2010, 205 (02) : 286 - 292
  • [8] Smart Abstraction Based on Iterative Cover and Non-Uniform Cells
    Calbert, Julien
    Egidio, Lucas N.
    Jungers, Raphael M.
    IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 2301 - 2306
  • [9] Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image
    Bi X.
    Yan W.
    Qiu Y.
    Xiao B.
    Li W.
    Ma J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (06): : 1356 - 1369
  • [10] Image authentication with tampering localization based on watermark embedding in wavelet domain
    Chang, Hsuan T.
    Hsu, Chih-Chung
    Yeh, Chia-Hung
    Shen, Day-Fann
    OPTICAL ENGINEERING, 2009, 48 (05)