Hierarchical multiple image watermarking for image authentication and ownership verification

被引:0
|
作者
Patra, JC [1 ]
Ang, KK [1 ]
Ang, EL [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 2263, Singapore
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a novel scheme in which two black and white images are embedded as watermarks into a host image. The first watermark is intended for secure image authentication and the second one is to verify the ownership. The two watermarks are embedded into the least significant bits of the host image using a private secret key in such a way that these images remain perceptually invisible to human eyes. The multiple watermark images can be easily extracted at the receiver site blindly, i.e., without aid of the original host image. If the watermarked image is tampered in any way, the recipient can only extract the first watermark image and the region of tampering will appear on it, whereas the second extracted watermark image will reveal only a random noisy image.
引用
收藏
页码:2661 / 2664
页数:4
相关论文
共 50 条
  • [1] Secret and public key image watermarking schemes for image authentication and ownership verification
    Wong, PW
    Memon, N
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2001, 10 (10) : 1593 - 1601
  • [2] Chaos-based Fragile Watermarking Technique for Binary Image Authentication and Ownership Verification
    Hou Jianjun
    Li Zhaohong
    Song Wei
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1-2, 2008, : 665 - 669
  • [3] A Fractal Based Image Watermarking For Authentication And Verification
    Kiani, Soheila
    Moghaddam, Mohsen Ebrahimi
    [J]. PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 15 - 19
  • [4] Hierarchical watermarking for secure image authentication with localization
    Celik, MU
    Sharma, G
    Saber, E
    Tekalp, AM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) : 585 - 595
  • [5] HIERARCHICAL FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Lin, Shinfeng D.
    Yang, Zong-Lin
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 245 - 255
  • [6] Hierarchical watermarking scheme for image authentication and recovery
    Lin, PL
    Hsieh, CK
    Huang, PW
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 963 - 966
  • [7] Joint ownership verification for an image using digital watermarking
    Guo, HP
    Georganas, ND
    [J]. ITCC 2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2003, : 548 - 553
  • [8] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [9] Reversible Watermarking for Image Integrity Verification in Hierarchical PACS
    Fontani, Marco
    De Rosa, Alessia
    Caldelli, Roberto
    Filippini, Francesco
    Piva, Alessandro
    Consalvo, Matteo
    [J]. MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 161 - 168
  • [10] Watermarking for image authentication
    Wu, M
    Liu, BD
    [J]. 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, 1998, : 437 - 441