Secure reversible visible image watermarking with authentication

被引:39
|
作者
Tsai, Han-Min [1 ]
Chang, Long-Wen [1 ,2 ]
机构
[1] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
[2] Natl Tsing Hua Univ, Inst Informat Syst & Applicat, Hsinchu 300, Taiwan
关键词
Visible watermarking; Reversible data embedding; Image authentication; Lagrange multipliers;
D O I
10.1016/j.image.2009.11.002
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a secure reversible visible watermarking approach. The proposed pixel mapping function superposes a binary watermark image on a host image to create an intermediate visible watermarked image. Meanwhile, an almost inverse function generates the recovery data for restoring the original pixels. To prevent unauthorized users from approximating the original pixels in the watermarked region, this method adds an integer sequence in the intermediate watermarked image. The sequence is composed of integers generated by two random variables having normal distributions with zero means and distinct variances. The variances facilitate a trade-off between the watermark transparency and the noise generated by unauthorized users. The proposed method also uses Lagrange multipliers to find the optimized variances for the trade-off. Finally, this method uses reversible data embedding to embed the recovery data and hash value for reversibility and authentication, respectively. Experimental results show the watermark visibility for test images along with the watermark transparency for different variances. Using the optimized variances, the watermarked image is at the balance between the watermark transparency and the unauthorized-user-generating noise. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:10 / 17
页数:8
相关论文
共 50 条
  • [1] Public watermarking for reversible image authentication
    Gu, Qiaolun
    Gao, Tiegang
    [J]. CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 2, PROCEEDINGS, 2008, : 95 - +
  • [2] Stereo Image Reversible Watermarking for Authentication
    Luo, Ting
    Jiang, Gangyi
    Peng, Zongju
    Shao, Feng
    Yu, Mei
    [J]. 3D RESEARCH, 2015, 6 (01)
  • [3] Reversible image authentication based on watermarking
    Lee, Sang-Kwang
    Suh, Young-Ho
    Ho, Yo-Sung
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO - ICME 2006, VOLS 1-5, PROCEEDINGS, 2006, : 1321 - 1324
  • [4] A high secure reversible visible watermarking scheme
    Tsai, Han-Min
    Chang, Long-Wen
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 2106 - 2109
  • [5] Text fusion watermarking in Medical image with Semi-reversible for Secure transfer and Authentication
    Viswanathan, P.
    Krishna, P. Venkata
    [J]. 2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 585 - 589
  • [6] Hierarchical watermarking for secure image authentication with localization
    Celik, MU
    Sharma, G
    Saber, E
    Tekalp, AM
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) : 585 - 595
  • [7] Secure Image Authentication Using Watermarking and Blockchain
    Abrar, Alsehli
    Abdul, Wadood
    Ghouzali, Sanaa
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 28 (02): : 577 - 591
  • [8] A secure and localizing watermarking technique for image authentication
    Ouda, AH
    El-Sakka, MR
    [J]. IMAGE ANALYSIS AND RECOGNITION, PT 2, PROCEEDINGS, 2004, 3212 : 759 - 769
  • [9] A secure fragile watermarking scheme for image authentication
    He, Hongjie
    Zhang, Jiashu
    Tai, Heng-Ming
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1180 - 1185
  • [10] Public key watermarking for reversible image authentication
    Lee, Sang-Kwang
    Suh, Young-Ho
    Ho, Yo-Sung
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 1409 - +