Entropy-Based Semi-Fragile Watermarking of Remote Sensing Images in the Wavelet Domain

被引:11
|
作者
Serra-Ruiz, Jordi [1 ]
Qureshi, Amna [1 ]
Megias, David [1 ]
机构
[1] Univ Oberta Catalunya, Internet Interdisciplinary Inst IN3, CYBERCAT Ctr Cybersecur Res Catalonia, Barcelona 08860, Spain
关键词
entropy; tampering detection; image forensics; image authentication; semi-fragile watermarking; wavelet transform; hyperspectral images; COMPRESSION; AUTHENTICATION;
D O I
10.3390/e21090847
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This article presents a semi-fragile image tampering detection method for multi-band images. In the proposed scheme, a mark is embedded into remote sensing images, which have multiple frequential values for each pixel, applying tree-structured vector quantization. The mark is not embedded into each frequency band separately, but all the spectral values (known as signature) are used. The mark is embedded in the signature as a means to detect if the original image has been forged. The image is partitioned into three-dimensional blocks with varying sizes. The size of these blocks and the embedded mark is determined by the entropy of each region. The image blocks contain areas that have similar pixel values and represent smooth regions in multispectral or hyperspectral images. Each block is first transformed using the discrete wavelet transform. Then, a tree-structured vector quantizer (TSVQ) is constructed from the low-frequency region of each block. An iterative algorithm is applied to the generated trees until the resulting tree fulfils a requisite criterion. More precisely, the TSVQ tree that matches a particular value of entropy and provides a near-optimal value according to Shannon's rate-distortion function is selected. The proposed method is shown to be able to preserve the embedded mark under lossy compression (above a given threshold) but, at the same time, it detects possibly forged blocks and their positions in the whole image. Experimental results show how the scheme can be applied to detect forgery attacks, and JPEG2000 compression of the images can be applied without removing the authentication mark. The scheme is also compared to other works in the literature.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] Review on semi-fragile watermarking algorithms for content authentication of digital images
    Yu X.
    Wang C.
    Zhou X.
    Wang, Chengyou (wangchengyou@sdu.edu.cn), 2017, MDPI AG (09):
  • [42] Semi-fragile watermarking based content image authentication scheme
    Cruz, Clara
    Reyes, Rogelio
    Nakano, Mariko
    Perez, Hector
    REVISTA FACULTAD DE INGENIERIA-UNIVERSIDAD DE ANTIOQUIA, 2010, (56): : 160 - 169
  • [43] Image Content Authentication System Based on Semi-Fragile Watermarking
    Cruz, Clara
    Reyes, Rogelio
    Nakano, Mariko
    Perez, Hector
    2008 51ST MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2008, : 306 - 309
  • [44] Tamper Detection of Electronic Bills based on Semi-Fragile Watermarking
    Xie, Yi
    Chen, Yixin
    Wang, Yulin
    PROCEEDINGS 2016 FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP 2016), 2016, : 41 - 44
  • [45] DCT-based semi-fragile watermarking for image authentication
    Chen, Zhigang
    Zhu, Congxu
    2005 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2005, : 801 - 805
  • [46] Image authentication based on digital signature and semi-fragile watermarking
    Hong-Bin Zhang
    Cheng Yang
    Xiao-Mei Quan
    Journal of Computer Science and Technology, 2004, 19 : 752 - 759
  • [47] SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION
    Fei, Chuhong
    Kwong, Raymond
    Kundur, Deepa
    2009 FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2009, : 141 - +
  • [48] Semi-Fragile Neural Network Watermarking Based on Adversarial Examples
    Yuan, Zihan
    Zhang, Xinpeng
    Wang, Zichi
    Yin, Zhaoxia
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2024, 8 (04): : 2775 - 2790
  • [49] Semi-fragile image watermarking based on block mean difference
    Shin, DH
    Kim, JW
    Choi, JU
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 577 - 583
  • [50] The research of semi-fragile watermarking algorithm based on dynamic segmentation
    Che Shengbing
    Shu Xu
    NANOTECHNOLOGY AND COMPUTER ENGINEERING, 2010, 121-122 : 1044 - 1047