A watermarking scheme based on rotating vector for image content authentication

被引:6
|
作者
Fu, Jianjing [1 ]
Mao, Jiafa [2 ]
Xue, Dawen [3 ]
Chen, Deren [4 ]
机构
[1] Commun Univ Zhejiang, Coll New Media, Hangzhou 310018, Peoples R China
[2] Zhejiang Univ Technol, Coll Comp Sci & Technol, Hangzhou 310023, Peoples R China
[3] Ningbo Univ Technol, Sch Elect & Informat Engn, Ningbo 315016, Peoples R China
[4] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
关键词
Content authentication; JPEG; JPEG2000; Semi-fragile watermark; Tampering localization; SEMI-FRAGILE WATERMARKING; ROBUST; ATTACKS;
D O I
10.1007/s00500-019-04318-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Semi-fragile watermarking technique for digital image, as a technology for content authentication, aims at telling malicious tampering from content-preserving operators. However, with the resolution of imaging sensors increasing and the explosive growth of digital images on the internet, before authorization, watermarked images tend to undergo such double-compression environments as: first compression (JPEG/JPEG2000) for release, decoding, application processing (conventional signal processing such as nosing, filtering, cropping, and scaling/security attack/malicious tampering), and second compression (JPEG2000/JPEG) for release again. In this paper, based on rotating vector, we propose a novel watermarking expression method that can describe carrier semantics to a certain extent and its modulation algorithm for digital image, and analyze the stability of the watermarked data theoretically. Then, a semi-fragile watermarking scheme is proposed for image content authentication to effectively distinguish malicious content manipulation from content-preserving operations in the double-compression application environment, which expands the application scope of content authentication based on watermarking technology.
引用
收藏
页码:5755 / 5772
页数:18
相关论文
共 50 条
  • [1] A watermarking scheme based on rotating vector for image content authentication
    Jianjing Fu
    Jiafa Mao
    Dawen Xue
    Deren Chen
    [J]. Soft Computing, 2020, 24 : 5755 - 5772
  • [2] Content-based watermarking scheme for image authentication
    Yu, SS
    Hu, YP
    Zhou, JL
    [J]. 2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 1083 - 1087
  • [3] A content-based fragile watermarking scheme for image authentication
    Kim, MA
    Lee, WH
    [J]. CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 258 - 265
  • [4] A content based image watermarking scheme for authentication using quadtrees
    Parameswaran, Latha
    Anburnani, K.
    [J]. 2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 146 - +
  • [5] Semi-fragile watermarking based content image authentication scheme
    Cruz, Clara
    Reyes, Rogelio
    Nakano, Mariko
    Perez, Hector
    [J]. REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2010, (56): : 160 - 169
  • [6] FEATURE BASED WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Liu, Hongmei
    Rao, Junhui
    Yao, Xinzhi
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, : 229 - 232
  • [7] Content-based watermarking for image authentication
    Lamy, P
    Martinho, J
    Rosa, T
    Queluz, MP
    [J]. INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 187 - 198
  • [8] Novel watermarking scheme for image authentication using vector quantization approach
    Tiwari A.
    Sharma M.
    [J]. Radioelectronics and Communications Systems, 2017, 60 (04) : 161 - 172
  • [9] A quantization-based semi-fragile watermarking scheme for image content authentication
    Qi, Xiaojun
    Xin, Xing
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2011, 22 (02) : 187 - 200
  • [10] Image authentication and recovery scheme based on watermarking technique
    Sumitomo, Kenji
    Nakano, Mariko
    Perez, Hector
    [J]. PROCEEDINGS OF THE 2ND WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: MODERN TOPICS OF COMPUTER SCIENCE, 2008, : 94 - +