A Tampering Detection Algorithm Based on Multi - scrambling Coding

被引:0
|
作者
Wang, Haoyuan [1 ]
Wang, Xin [1 ]
Jiang, Li [1 ]
机构
[1] Zhengzhou Univ, Sch Informat Engn, Zhengzhou 450001, Peoples R China
关键词
Semi-fragile water lark; multi-scrambling coding; content authentication; tampering detection; WATERMARKING; SCHEME;
D O I
10.1117/12.2599687
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In order to authenticate the content of the image and find out the tampered location, semi-fragile water lark technology usually extracts feature information from image blocks as watermark, which will be embedded into irrelevant blocks by block mapping algorithm. When a block is tampered, its original feature hidden in other blocks will not be changed. However, it must be pointed out that this situation only considers that the original feature information of the tampered block has been tampered, but ignores that the feature information of other blocks embedded in the tampered position is also destroyed. It is impossible to recognize that whether the tampered area itself or the image block whose feature information embedded in the tampered area is tampered, resulting in increasing of false detection rate. In order to improve the accuracy of tamper detection of semi-fragile watermark algorithm, this paper proposes a novel tampering detection algorithm, which performs multi-scrambling encoding on the extracted feature information, and establishing a tampering equation related to each block according to the multi-scrambling encoding. According to the sum of tampering equation to determine whether the image block has been tampered. Experimental results show that after using the tampering detection algorithm proposed by this paper, both the false rejection probability and false acceptance probability are lower than the previous algorithms. In addition, the false acceptance probability is still very low under JPEG compression.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] An Image Similarity Acceleration Detection Algorithm Based on Sparse Coding
    Luan Xidao
    Xie Yuxiang
    Zhang Lili
    Zhang Xin
    Li Chen
    He Jingmeng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [42] Joint detection and decoding algorithm based on SCMA and convolution coding
    Zhao H.
    Liu C.
    Xu L.
    Luo X.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2021, 43 (03): : 847 - 853
  • [43] Digital Video Tampering Detection and Localization: Review, Representations, Challenges and Algorithm
    Akhtar, Naheed
    Saddique, Mubbashar
    Asghar, Khurshid
    Bajwa, Usama Ijaz
    Hussain, Muhammad
    Habib, Zulfiqar
    MATHEMATICS, 2022, 10 (02)
  • [44] The effect of coding on genetic algorithm based structural damage detection
    Yap, KC
    Zimmerman, DC
    IMAC - PROCEEDINGS OF THE 16TH INTERNATIONAL MODAL ANALYSIS CONFERENCE, VOLS 1 AND 2, 1998, 3243 : 165 - 171
  • [45] A hybrid evolutionary algorithm for feature and ensemble selection in image tampering detection
    Goh, Jonathan
    Thing, Vrizlynn L. L.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (01) : 76 - 104
  • [46] Image tampering detection based on feature consistency attention
    Gu, Junlin
    Xu, Yihan
    Sun, Juan
    Liu, Weiwei
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 23 (01) : 1 - 15
  • [47] Formant Enhancement based Speech Watermarking for Tampering Detection
    Wang, Shengbei
    Unoki, Masashi
    Kim, Nam Soo
    15TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2014), VOLS 1-4, 2014, : 1366 - 1370
  • [48] Tampering Detection and Hash Coding Self-Recovery in Digital Image Protection.
    Aruna, M.
    Narayanasamy, Srinivasan N.
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (03): : 452 - 459
  • [49] Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles
    Li, Mianjie
    Pei, Qihan
    Shan, Chun
    Su, Shen
    Liu, Yuan
    Tian, Zhihong
    COMPUTER NETWORKS, 2024, 252
  • [50] Speech Watermarking for Tampering Detection Based on Modifications to LSFs
    Chen, Xiangning
    Yuan, Weitao
    Wang, Shengbei
    Wang, Chao
    Wang, Lin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2019, 2019