Time-Frequency and Time-Scale-Based Fragile Watermarking Methods for Image Authentication

被引:4
|
作者
Barkat, Braham [2 ]
Sattar, Farook [1 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[2] Petr Inst, Dept Elect Engn, Abu Dhabi, U Arab Emirates
关键词
Discrete Wavelet Transform; Watermark Image; JPEG Compression; Watermark Method; Watermark Extraction;
D O I
10.1155/2010/408109
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two fragile image watermarking methods are proposed for image authentication. The first method is based on time-frequency analysis and the second one is based on time-scale analysis. For the first method, the watermark is chosen as an arbitrary nonstationary signal with a particular signature in the time-frequency plane. Experimental results show that this technique is very sensitive to many attacks such as cropping, scaling, translation, JPEG compression, and rotation, making it very effective in image authentication. For the second method, based on a wavelet-domain multiresolution analysis, quantization index modulation (QIM) embedding scheme and arbitrary frequency-modulated (FM) chirp watermarks are used in the implementation. In this blind technique, the original watermark is needed neither for the content integrity verification of the original image nor for the content quality assessment of the distorted image. Copyright © 2010 Braham Barkat and Farook Sattar.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Oblivious fragile watermarking scheme for image authentication
    Li, CT
    Yang, FM
    Lee, CS
    [J]. 2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3445 - 3448
  • [42] Security of fragile watermarking scheme for image authentication
    Liao, K-C
    Lee, W-B
    Liao, C-W
    [J]. IMAGING SCIENCE JOURNAL, 2006, 54 (03): : 129 - 133
  • [43] Region of interest fragile watermarking for image authentication
    Chu, Yiping
    Zhang, Yin
    Zhang, Sanyuan
    Ye, Xiuzi
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 1, 2006, : 726 - +
  • [44] A Fragile Watermarking Scheme for Color Image Authentication
    Hassan, M. Hamad
    Gilani, S. A. M.
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 312 - 316
  • [45] A new fragile watermarking technique for image authentication
    Zhong, H
    Liu, F
    Jiao, LC
    [J]. 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 792 - 795
  • [46] HIERARCHICAL FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Lin, Shinfeng D.
    Yang, Zong-Lin
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 245 - 255
  • [47] Fragile watermarking schemes for image authentication: a survey
    K. Sreenivas
    V. Kamkshi Prasad
    [J]. International Journal of Machine Learning and Cybernetics, 2018, 9 : 1193 - 1218
  • [48] A secure fragile watermarking scheme for image authentication
    He, Hongjie
    Zhang, Jiashu
    Tai, Heng-Ming
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1180 - 1185
  • [49] A chaotic fragile watermarking algorithm for image authentication
    Zhu, Congxu
    Huang, Dazu
    Hu, Yuping
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2007, : 829 - 833
  • [50] COMPARING TWO TIME-SCALE AND TIME-FREQUENCY BASED METHODS IN NEWBORNS' EEG SEIZURE DETECTION
    Zarjam, Pega
    Mesbah, Mostefa
    Boashash, Boualem
    [J]. ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2007, : 1579 - +