Watermarking-based Color Image Authentication With Detection And Recovery Capability

被引:14
|
作者
Roldan, L. R. [1 ]
Hernandez, M. C. [2 ]
Chao, J. [1 ]
Miyatake, M. N. [2 ]
Meana, H. P. [2 ]
机构
[1] Chuo Univ, Tokyo, Japan
[2] Inst Politecn Nacl, Mexico City, DF, Mexico
关键词
Watermark; Color Images; Authentication; Detection Capability; Recovery Capability; DCT; IWT; MLP; TAMPER DETECTION;
D O I
10.1109/TLA.2016.7437257
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper a watermarking-based color image authentication with detection and recovery capability is proposed, in which a Halftone image is used as an approximated version of the luminance channel (Y) and a coded version of the coefficients of the Two Dimensional Discrete Cosine Transform of the chrominance channels (Cb, Cr) of the YCbCr color space are used as watermark signal. The luminance and chrominance information is embedded into the sub-bands of lowest frequency of the Integer Wavelet Transform of the original luminance channel using Quantization Index Modulation Dither Modulation. The luminance information in embedded into the LL sub-band meanwhile the chrominance information is embedded into the LH and HL sub-bands. Besides, a Multilayer Perceptron Neural Network is used as inverse halftoning to increase the quality of the recovered image. The experimental results show the effectiveness of the proposed method compared with some published before.
引用
收藏
页码:1050 / 1057
页数:8
相关论文
共 50 条
  • [1] Semi-fragile Watermarking-based Color Image Authentication with Recovery Capability
    Rosales-Roldan, Luis
    Cedillo-Hernandez, Manuel
    Chao, Jinhui
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 528 - 534
  • [2] Watermarking-based image authentication with recovery capability using halftoning technique
    Rosales-Roldan, Luis
    Cedillo-Hernandez, Manuel
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    Kurkoski, Brian
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (01) : 69 - 83
  • [3] A Survey of Watermarking-Based Authentication for Digital Image
    Lee, Chin-Feng
    Shen, Jau-Ji
    Chen, Zhao-Ru
    [J]. PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, : 207 - 211
  • [4] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [5] A watermarking-based authentication and recovery scheme for encrypted audio
    Zhenghui Liu
    Yi Cao
    Kejia Lin
    [J]. Multimedia Tools and Applications, 2024, 83 : 10969 - 10987
  • [6] A watermarking-based authentication and recovery scheme for encrypted audio
    Liu, Zhenghui
    Cao, Yi
    Lin, Kejia
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (04) : 10969 - 10987
  • [7] Watermarking-based image authentication robust to JPEG compression
    Preda, R. O.
    Vizireanu, D. N.
    [J]. ELECTRONICS LETTERS, 2015, 51 (23) : 1873 - 1874
  • [8] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [9] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [10] The survey of digital watermarking-based image authentication techniques
    Liu, T
    Qiu, ZD
    [J]. 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 1556 - 1559