A secure image authentication scheme for tamper detection and recovery

被引:4
|
作者
Chen, T-Y [2 ]
Hwang, M-S [1 ]
Jan, J-K [3 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[2] Hsiuping Inst Technol, Dept Informat Networking Technol, Taichung 41280, Taiwan
[3] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 40227, Taiwan
来源
IMAGING SCIENCE JOURNAL | 2012年 / 60卷 / 04期
关键词
image authentication; tamper detection and recovery; watermarking; FRAGILE WATERMARKING SCHEME; STEGANOGRAPHIC METHOD; ROBUST;
D O I
10.1179/1743131X11Y.0000000018
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
In recent decades, many watermarking schemes for tamper detection and tampered image recovery have been proposed. However, most of these schemes suffered from several kinds of attacks due to the lack of considering security issues. In this paper, an improved and elaborately designed scheme is proposed after the drawbacks of these schemes are analysed and discussed. The proposed scheme outperforms the other schemes in terms of the sensitivity to the alteration in the protected image as well as the resistibility to the well-known attacks, such as the counterfeit attack, the disturbing attack and the leakage of the secret key. In addition, the watermarked images and the recovered images generated by the proposed scheme demonstrate competent qualities.
引用
收藏
页码:219 / 233
页数:15
相关论文
共 50 条
  • [31] Dual watermark for image tamper detection and recovery
    Lee, Tien-You
    Lin, Shinfeng D.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3497 - 3506
  • [32] A Triple Self-Embedding Fragile Watermarking Scheme for Image Tamper Detection and Recovery
    Ozkaya, Huseyin
    Aslantas, Veysel
    [J]. IEEE Access, 2024, 12 : 140082 - 140096
  • [33] A Novel Medical Image Tamper Detection and Recovery Scheme using LSB Embedding and PWLCM
    Gao, Lin
    Gao, Tiegang
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (02) : 1 - 22
  • [34] A secure fragile watermarking scheme for image authentication
    He, Hongjie
    Zhang, Jiashu
    Tai, Heng-Ming
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1180 - 1185
  • [35] A majority-voting based watermarking scheme for color image tamper detection and recovery
    Wang, Ming-Shi
    Chen, Wei-Che
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 561 - 570
  • [36] Image tamper detection and recovery by intersecting signatures
    [J]. Tang, Yuan-Liang, 1600, Universitas Ahmad Dahlan (12):
  • [37] An image authentication scheme with localization and recovery
    Chuanmu, Li
    Lili, Liu
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 5, PROCEEDINGS, 2008, : 669 - 673
  • [38] Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems
    Tayachi, Mayssa
    Mulhem, Saleh
    Adi, Wael
    Nana, Laurent
    Pascu, Anca
    Benzarti, Faouzi
    [J]. CRYPTOGRAPHY, 2020, 4 (03) : 1 - 24
  • [39] IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS
    Qi, Xiaojun
    Xin, Xing
    Chang, Ran
    [J]. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 4257 - 4260