Content-based watermarking in image authentication allowing remedying of tampered images

被引:12
|
作者
Yeh, F. H. [1 ]
Lee, G. C. [1 ]
机构
[1] Natl Taiwan Normal Univ, Dept Informat & Comp Educ, Taipei, Taiwan
关键词
image processing; image transmission; image reconstruction;
D O I
10.1117/1.2227367
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Fragile watermarking techniques are developed to ensure the credibility and integrity of images in open communication channels. Many related studies have proposed methods for accurately localizing tampered areas, but the ability to recover such areas has received less attention. Therefore, we propose a content-based fragile watermarking technique that can both accurately localize tampered areas and correct them in details, using embedded content-based watermarks. Our scheme provides a novel watermark structure. It adopts JPEG-compressed watermark prototypes and categorizes them into smooth, mid-textured, and textured areas. To resist forged-watermark attacks and promote self-recovery ability, the relationships among blocks are created by a toral automorphism with an asymmetric key structure. Furthermore, the watermark prototypes are disordered by a one-way hashing function and encrypted by a public-key encryption function to increase the security of watermarks. Finally, the watermarks are embedded to protect the integrity of images. Experiments show that the proposed scheme can correctly localize tampered areas and remedy them to the extent of JPEG-compression quality even when 50% of the image is cropped, and resist forged-watermark attacks. (c) 2006 Society of Photo-Optical Instrumentation Engineers.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Content-based watermarking for image authentication
    Lamy, P
    Martinho, J
    Rosa, T
    Queluz, MP
    INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 187 - 198
  • [2] Content-based watermarking scheme for image authentication
    Yu, SS
    Hu, YP
    Zhou, JL
    2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 1083 - 1087
  • [3] A content-based fragile watermarking scheme for image authentication
    Kim, MA
    Lee, WH
    CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 258 - 265
  • [4] CONTENT-BASED AUDIO AUTHENTICATION WATERMARKING
    Gulbis, Michael
    Mueller, Erika
    Steinebach, Martin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (07): : 1883 - 1892
  • [5] Content-Based Watermarking for Image Authentication Using Independent Component Analysis
    Parameswaran, Latha
    Anbumani, K.
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (03): : 299 - 306
  • [6] Security Analysis of Content-Based Watermarking Authentication Framework
    Wang, Jinwei
    Liu, Guangjie
    Lian, Shiguo
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 483 - +
  • [7] Content-based authentication watermarking with improved audio content feature extraction
    Gulbis, Michael
    Mueller, Erika
    Steinebach, Martin
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 620 - +
  • [8] Content-based watermarking using image texture
    Köppen, M
    Liu, XF
    2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 1576 - 1579
  • [9] CONTENT-BASED AUTHENTICATION ALGORITHM FOR BINARY IMAGES
    Yao, Xinzhi
    Liu, Hongmei
    Rui, Wei
    Huang, Jiwu
    2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 2893 - 2896
  • [10] Combining multilevel manipulation estimation with content-based authentication watermarking
    Gulbis, Michael
    Mueller, Erika
    Steinebach, Martin
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 461 - +