A secure fragile watermarking scheme for image authentication

被引:1
|
作者
He, Hongjie [1 ]
Zhang, Jiashu [1 ]
Tai, Heng-Ming [2 ]
机构
[1] SW Jiaotong Univ, Sichuan Key Lab Signal & Informat Proc, Chengdu 610031, Sichuan, Peoples R China
[2] Univ Tulsa, Dept Elect Engn, Tulsa, OK 74104 USA
关键词
D O I
10.1109/ICCIAS.2006.295451
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A fragile watermarking scheme for secure image authentication is proposed. A scrambling encryption scheme is introduced to extend the security and increase the capacity of the fragile watermarking algorithm. The proposed algorithm not only possesses excellent tamper localization properties, but also demonstrates a new useful feature, called tamper discrimination. That is, it can indicate whether the modification made to the image is on the contents or the embedded watermark or both. If only the watermark is modified the verification algorithm will display isolated dots spread all over the image, not just the altered regions. Thus the authenticity of the image is assured, instead of being declared as a counterfeit. Experimental results are given to illustrate the effectiveness of our method.
引用
收藏
页码:1180 / 1185
页数:6
相关论文
共 50 条
  • [31] A new time-frequency based fragile watermarking scheme for image authentication
    Sattar, F
    Barkat, B
    [J]. 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2003, : 992 - 995
  • [32] Content-fragile watermarking for image authentication
    Dittmann, J
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 175 - 184
  • [33] Fragile watermarking schemes for image authentication: a survey
    Sreenivas, K.
    Kamkshi Prasad, V.
    [J]. INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2018, 9 (07) : 1193 - 1218
  • [34] Toral fragile watermarking for image authentication with localization
    Yeh, FH
    Lee, GC
    [J]. PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, 2004, : 47 - 52
  • [35] Region of interest fragile watermarking for image authentication
    Chu, Yiping
    Zhang, Yin
    Zhang, Sanyuan
    Ye, Xiuzi
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 1, 2006, : 726 - +
  • [36] A new fragile watermarking technique for image authentication
    Zhong, H
    Liu, F
    Jiao, LC
    [J]. 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 792 - 795
  • [37] Fragile watermarking schemes for image authentication: a survey
    K. Sreenivas
    V. Kamkshi Prasad
    [J]. International Journal of Machine Learning and Cybernetics, 2018, 9 : 1193 - 1218
  • [38] A chaotic fragile watermarking algorithm for image authentication
    Zhu, Congxu
    Huang, Dazu
    Hu, Yuping
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2007, : 829 - 833
  • [39] A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images based on Wavelet Transform
    Chamlawi, Rafiullah
    Khan, Asifullah
    Idris, Adnan
    Munir, Zahid
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 17, 2006, 17 : 217 - +
  • [40] A fragile watermarking scheme for medical image
    Wang Gang
    Rao Ni-Ni
    [J]. 2005 27TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-7, 2005, : 3406 - 3409