A Survey of Watermarking-Based Authentication for Digital Image

被引:0
|
作者
Lee, Chin-Feng [1 ]
Shen, Jau-Ji [2 ]
Chen, Zhao-Ru [2 ]
机构
[1] Chaoyang Univ Technol, Dept Informat Management, Taichung, Taiwan
[2] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung, Taiwan
关键词
image authentication; fragile watermarking; image recovery; tamper localization; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper discusses fragile watermarking techniques in image authentication technology, which can be divided into recoverable and unrecoverable methods. Recoverable technology is to use reversible data hiding method to hide the authentication code, and not to hide the recovery information. So after the image tampered, it only can locate the tampered area. The unrecoverable technique is to use the LSB substitution method to hide the authentication code and the recovery information, so that the image can be changed after the image tampered. In this paper, four different image authentication methods are comprehensively discussed and compared, including features, image quality and error rates.
引用
收藏
页码:207 / 211
页数:5
相关论文
共 50 条
  • [1] The survey of digital watermarking-based image authentication techniques
    Liu, T
    Qiu, ZD
    [J]. 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 1556 - 1559
  • [2] Watermarking-based digital audio data authentication
    Steinebach, M
    Dittmann, J
    [J]. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2003, 2003 (10) : 1001 - 1015
  • [3] A digital watermarking-based image authentication mechanic for distributed embedded systems
    Yuan, S
    Huss, SA
    [J]. International Conference on Computing, Communications and Control Technologies, Vol 3, Proceedings, 2004, : 207 - 212
  • [4] Watermarking-Based Digital Audio Data Authentication
    Martin Steinebach
    Jana Dittmann
    [J]. EURASIP Journal on Advances in Signal Processing, 2003
  • [5] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [6] Watermarking-based image authentication robust to JPEG compression
    Preda, R. O.
    Vizireanu, D. N.
    [J]. ELECTRONICS LETTERS, 2015, 51 (23) : 1873 - 1874
  • [7] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [8] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [9] Watermarking-based Color Image Authentication With Detection And Recovery Capability
    Roldan, L. R.
    Hernandez, M. C.
    Chao, J.
    Miyatake, M. N.
    Meana, H. P.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (02) : 1050 - 1057
  • [10] Watermarking-based image authentication with recovery capability using halftoning technique
    Rosales-Roldan, Luis
    Cedillo-Hernandez, Manuel
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    Kurkoski, Brian
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (01) : 69 - 83