A semi-fragile image watermarking algorithm with two-stage detection

被引:22
|
作者
Huo, Yaoran [1 ]
He, Hongjie [1 ]
Chen, Fan [1 ]
机构
[1] Southwest Jiaotong Univ, Sichuan Key Lab Signal & Informat Proc, Chengdu, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
Semi-fragile watermarking; Tamper detection; Two-stage detection; Identification parameter; AUTHENTICATION; SCHEME;
D O I
10.1007/s11042-012-1317-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ability against the collage attack of semi-fragile watermarking is improved by embedding the watermark of a block in other blocks, but the tamper detection performance is impaired under general tampering. A two-stage detection method is proposed to improve the tamper detection performance of semi-fragile watermarking. For each 8 x 8 block, six-bit watermark data generated by the significant DCT (Discrete Cosine Transformation) coefficients are divided into two parts with the same length: general tampering watermark (GTW) and collage attack watermark (CAW). The GTW and CAW data of a block are embedded in the quantized DCT coefficients of itself and other blocks, respectively. In the first-stage detection, the general tampered regions are localized by the GTW data. To identify whether the collage attack exists in the received image, the identification parameter is defined by both GTW and CAW data. The selection of the predefined threshold of the identification parameter is derived and verified by the statistical experiments. If the identification parameter is larger than the given threshold, the second stage detection is performed to detect the collaged regions. Experimental results demonstrate that the proposed two-stage detection method is able to identify tampering with high probability under general tampering, collage attack and hybrid attack.
引用
收藏
页码:123 / 149
页数:27
相关论文
共 50 条
  • [21] Semi-Fragile Watermarking for Copyright Protection and Image Authentication
    HUANG Ji-fengDepartment of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 284 - 288
  • [22] A Semi-Fragile Watermarking Scheme for Color Image Authentication
    Hassan, M. Hamad
    Gilani, S. A. M.
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 317 - 321
  • [23] A novel semi-fragile watermarking technique for image authentication
    Ko, CC
    Huang, CH
    [J]. PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, 2004, : 24 - 29
  • [24] A novel semi-fragile watermarking technique for image authentication
    Yang, SY
    Lu, ZD
    Zou, FH
    [J]. 2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2282 - 2285
  • [25] Semi-fragile watermarking technique for image tamper localization
    Hao, Zhou
    Li, Haiyan
    Yu, Pengfei
    [J]. 2009 INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, VOL I, 2009, : 519 - 523
  • [26] A Semi-fragile Image Watermarking Resisting to JPEG Compression
    Wang, Xiangqing
    Wang, Jun
    Peng, Hong
    [J]. ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 498 - +
  • [27] Detect image tamper by semi-fragile digital watermarking
    Liu, FL
    Wang, YS
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2004, 13 (01) : 54 - 57
  • [28] Semi-fragile watermarking based on SVM for image authentication
    Li Chun-hua
    Ling He-fei
    Lu Zheng-ding
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1255 - 1258
  • [29] Semi-fragile watermarking algorithm based on slant transform
    [J]. Wang, Y.-W. (wyw4966198@126.com), 1600, Beijing University of Technology (39):
  • [30] Semi-Fragile Audio Watermarking Algorithm in DWT Domain
    Lei Min
    Yang Yu
    Luo Shoushan
    Niu Xinxin
    [J]. CHINA COMMUNICATIONS, 2010, 7 (04) : 71 - 75