A region-adaptive semi-fragile dual watermarking scheme

被引:12
|
作者
Shi, Hui [1 ,2 ]
Li, Ming-chu [1 ]
Guo, Cheng [1 ]
Tan, Ru [2 ]
机构
[1] Dalian Univ Technol, Sch Software Technol, Dalian 116621, Liaoning, Peoples R China
[2] Liaoning Normal Univ, Network Informat Management Ctr, Dalian 116021, Liaoning, Peoples R China
关键词
Dual watermark; Semi-fragile; Status code; Bit substitution; Region-adaptive; DISCRETE WAVELET TRANSFORM; IMAGE WATERMARKING; DIGITAL WATERMARKING; TAMPER DETECTION; AUTHENTICATION; ALGORITHMS; RECOVERY;
D O I
10.1007/s11042-014-2301-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since existing watermarking schemes usually have only a single function, a region-adaptive semi-fragile dual watermarking scheme is proposed, taking into account both watermark embedding capacity and security. The dual watermarks refer to the robust watermark and the fragile watermark. The original image is divided into three regions, i.e., a no watermark region, a fragile watermark region, and a robust watermark region, and, then, the interrelated robust and fragile watermarks are embedded into different regions. The robust and fragile watermarks do not relate to embedding order, and the extracted fragile watermark further strengthens the extracted robust watermark, which makes it more adaptable to the Human Visual System (HVS). Different techniques have been developed to embed different types of watermarks. To increase the embedding capacity and achieve blind extraction, a status code technology was used to embed the robust watermark. To resist the erase attack and achieve blind extraction, a new special bit substitution technology is proposed to embed the fragile watermark. The experimental results show that the proposed dual watermark scheme has higher PSNR, better security, and larger capacity and also achieves the dual functions of copyright protection and integrity verification.
引用
收藏
页码:465 / 495
页数:31
相关论文
共 50 条
  • [1] A region-adaptive semi-fragile dual watermarking scheme
    Hui Shi
    Ming-chu Li
    Cheng Guo
    Ru Tan
    [J]. Multimedia Tools and Applications, 2016, 75 : 465 - 495
  • [2] Novel adaptive semi-fragile watermarking scheme based on image content
    School of Computer and Information Technology, Liaoning Normal University, Dalian 116029, China
    不详
    [J]. Zidonghua Xuebao, 2007, 4 (361-366):
  • [3] A novel semi-fragile audio watermarking scheme
    Tu, RH
    Zhao, JY
    [J]. 2ND IEEE INTERNATIONAL WORKSHOP ON HAPTIC, AUDIO AND VISUAL ENVIRONMENTS AND THEIR APPLICATIONS - HAVE 2003, 2003, : 89 - 94
  • [4] Image Adaptive Semi-fragile Watermarking Scheme Based on RDWT-SVD
    Kourkchi, Hossein
    Ghaemmaghami, Shahrokh
    [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 574 - 578
  • [5] Semi-Fragile Watermarking Scheme for Authentication of JPEG Images
    Lin, Chih-Hung
    Su, Tung-Shih
    Hsieh, Wen-Shyong
    [J]. JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2007, 10 (01): : 57 - 66
  • [6] Semi-fragile watermarking scheme for authentication of JPEG images
    Ho, CK
    Li, CT
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 7 - 11
  • [7] A Semi-Fragile Watermarking Scheme for Color Image Authentication
    Hassan, M. Hamad
    Gilani, S. A. M.
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 317 - 321
  • [8] A semi-fragile watermarking scheme based on neural network
    Hong, F
    Shi, L
    Luo, T
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3536 - 3541
  • [9] Detector Polarization Scheme for Fragile, Semi-fragile and Hybrid Digital Watermarking
    Pacitti, Marcos de Castro
    Finamore, Weiler Alves
    [J]. PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, : 512 - +
  • [10] Recoverable semi-fragile watermarking scheme using cosine transform and adaptive median filter
    Hsieh, Shang-Lin
    Wu, Pei-Da
    Tsai, I-Ju
    Huang, Bin-Yuan
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 629 - 640