Towards tamper detection and classification with robust watermarks

被引:0
|
作者
Knowles, H [1 ]
Winne, D [1 ]
Canagarajah, N [1 ]
Bull, D [1 ]
机构
[1] Univ Bristol, Ctr Commun Res, Image Commun Grp, Bristol BS8 1UB, Avon, England
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a novel wavelet-based double watermarking system for the detection and subsequent characterisation of the tampering of images. Most tamper detection techniques use fragile watermarks. However, our previous work showed that this type of watermark is frequently completely destroyed by compression, which in many cases is undesirable. In addition, it gives little or no information about the nature of the attack. We propose using two robust watermarks, one inserted at the embedder, the other at the detector. The second watermark is used as a reference with which the first watermark May be compared. This allows additional information not previously available about the nature of the attack to be obtained. The use of a robust strategy prevents the watermark being easily destroyed, but instead allows the system to continue to perform after significant attacks.
引用
收藏
页码:959 / 962
页数:4
相关论文
共 50 条
  • [1] Towards blind detection of robust watermarks in polygonal models
    Benedens, O
    Busch, C
    [J]. COMPUTER GRAPHICS FORUM, 2000, 19 (03) : C199 - +
  • [2] IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS
    Qi, Xiaojun
    Xin, Xing
    Chang, Ran
    [J]. 2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 4257 - 4260
  • [3] Tamper Detection in RFID Tags Using Zero-watermarks
    Yao, Xiaoming
    Chen, Hongyu
    Li, Honglei
    Zhou, Xiaoyi
    [J]. SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 169 - 172
  • [4] An Image Tamper Detection and Recovery Method Using Multiple Watermarks
    Pongsomboon, Paween
    Kondo, Toshiaki
    Kamakura, Yoshiyuki
    [J]. 2016 13TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING/ELECTRONICS, COMPUTER, TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY (ECTI-CON), 2016,
  • [5] Towards robust classification detection for adversarial examples
    Liu, Huangxiaolie
    Zhang, Dong
    Chen, Huijun
    [J]. INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST-2020), 2020, : 23 - 29
  • [6] Robust detection of transform domain additive watermarks
    Huang, XL
    Zhang, B
    [J]. DIGITAL WATERMARKING, PROCEEDINGS, 2005, 3710 : 124 - 138
  • [7] Robust optimum detection of transform domain multiplicative watermarks
    Cheng, Q
    Huang, TS
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (04) : 906 - 924
  • [8] Reversible data embedding for tamper-proof watermarks
    Lee, HyeRan
    Rhee, KyungHyun
    [J]. ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 3, PROCEEDINGS, 2006, : 487 - +
  • [9] A Novel Robust Watermarking Algorithm for Image Tamper Detection
    Afzali, Nashmin
    Manochehri, Kooroush
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (11): : 16 - 19
  • [10] Robust Detection of Audio Watermarks after Acoustic Path Transmission
    Arnold, Michael
    Baum, Peter G.
    Chen, Xiao-Ming
    [J]. MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 117 - 126