Entropy-Based Semi-Fragile Watermarking of Remote Sensing Images in the Wavelet Domain

被引:11
|
作者
Serra-Ruiz, Jordi [1 ]
Qureshi, Amna [1 ]
Megias, David [1 ]
机构
[1] Univ Oberta Catalunya, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona 08860, Spain
关键词
entropy; tampering detection; image forensics; image authentication; semi-fragile watermarking; wavelet transform; hyperspectral images; COMPRESSION; AUTHENTICATION;
D O I
10.3390/e21090847
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This article presents a semi-fragile image tampering detection method for multi-band images. In the proposed scheme, a mark is embedded into remote sensing images, which have multiple frequential values for each pixel, applying tree-structured vector quantization. The mark is not embedded into each frequency band separately, but all the spectral values (known as signature) are used. The mark is embedded in the signature as a means to detect if the original image has been forged. The image is partitioned into three-dimensional blocks with varying sizes. The size of these blocks and the embedded mark is determined by the entropy of each region. The image blocks contain areas that have similar pixel values and represent smooth regions in multispectral or hyperspectral images. Each block is first transformed using the discrete wavelet transform. Then, a tree-structured vector quantizer (TSVQ) is constructed from the low-frequency region of each block. An iterative algorithm is applied to the generated trees until the resulting tree fulfils a requisite criterion. More precisely, the TSVQ tree that matches a particular value of entropy and provides a near-optimal value according to Shannon's rate-distortion function is selected. The proposed method is shown to be able to preserve the embedded mark under lossy compression (above a given threshold) but, at the same time, it detects possibly forged blocks and their positions in the whole image. Experimental results show how the scheme can be applied to detect forgery attacks, and JPEG2000 compression of the images can be applied without removing the authentication mark. The scheme is also compared to other works in the literature.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] Chaos based semi-fragile image watermarking algorithm
    Li, Zhao-Hong
    Hou, Jian-Jun
    Song, Wei
    Beijing Jiaotong Daxue Xuebao/Journal of Beijing Jiaotong University, 2007, 31 (02): : 52 - 56
  • [32] Speech authentication by semi-fragile watermarking
    Yan, B
    Lu, ZM
    Sun, SH
    Pan, JS
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 497 - 504
  • [33] Semi-fragile watermarking algorithm based on slant transform
    Wang, Y.-W. (wyw4966198@126.com), 1600, Beijing University of Technology (39):
  • [34] Semi-fragile watermarking based on SVM for image authentication
    Li Chun-hua
    Ling He-fei
    Lu Zheng-ding
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 1255 - 1258
  • [35] A semi-fragile watermarking scheme based on neural network
    Hong, F
    Shi, L
    Luo, T
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 3536 - 3541
  • [36] Semi-fragile watermarking for tamper detection
    Lin, KZ
    Xiong, CF
    Ma, Q
    Sun, H
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, : 193 - 198
  • [37] New Semi-Fragile Authentication Watermarking
    孙鑫
    易开祥
    费敏锐
    Journal of Shanghai University, 2002, (02) : 158 - 162
  • [38] New semi-fragile authentication watermarking
    Shi, JY
    Yi, KX
    ADVANCES IN MUTLIMEDIA INFORMATION PROCESSING - PCM 2001, PROCEEDINGS, 2001, 2195 : 969 - 974
  • [39] Compressive Sensing-Based Audio Semi-fragile Zero-Watermarking Algorithm
    TANG Xin
    MA Zhaofeng
    NIU Xinxin
    YANG Yixian
    ChineseJournalofElectronics, 2015, 24 (03) : 492 - 497
  • [40] Compressive Sensing-Based Audio Semi-fragile Zero-Watermarking Algorithm
    Tang Xin
    Ma Zhaofeng
    Niu Xinxin
    Yang Yixian
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (03) : 492 - 497