Fragile Watermarking-based Authentication Scheme for Demosaicked Images

被引:6
|
作者
Lin, Chia-Chen [1 ]
Liu, Xiao-Long [2 ]
Lin, Cheng-Han [3 ]
Yuan, Shyan-Ming [2 ]
机构
[1] Providence Univ, Dept Comp Sci & Informat, Taichung, Taiwan
[2] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu, Taiwan
[3] Providence Univ, Dept Comp Sci & Informat Management, Taichung, Taiwan
关键词
fragile watermarking; reversible authentication table (ACT); tamper detection; image demosaicking;
D O I
10.1109/IIH-MSP.2015.98
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a reversible fragile watermarking scheme for the authentication of demosaicked images. Each authentication code is embedded into the two rebuilt components of each color pixel by using a designed authentication table (ACT). The utilization of ACT secures the watermarking procedure and the watermarked image can be recovered back to the original demosaicked image by the proposed scheme. The proposed scheme is compared with some existing image authentication schemes, and the experimental results demonstrate that our scheme can preserve better image quality and provides superior tamper detection performance.
引用
收藏
页码:97 / 100
页数:4
相关论文
共 50 条
  • [1] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    [J]. PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [2] A watermarking-based authentication and recovery scheme for encrypted audio
    Zhenghui Liu
    Yi Cao
    Kejia Lin
    [J]. Multimedia Tools and Applications, 2024, 83 : 10969 - 10987
  • [3] Image authentication scheme based on reversible fragile watermarking with two images
    Peng, Yinyin
    Niu, Xuejing
    Fu, Lei
    Yin, Zhaoxia
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 236 - 246
  • [4] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    [J]. PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [5] A watermarking-based authentication and recovery scheme for encrypted audio
    Liu, Zhenghui
    Cao, Yi
    Lin, Kejia
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (04) : 10969 - 10987
  • [6] A novel watermarking-based reversible image authentication scheme
    Gao, Tiegang
    Gu, Qiaolun
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1269 - +
  • [7] Digital fragile watermarking scheme for authentication of JPEG images
    Li, CT
    [J]. IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2004, 151 (06): : 460 - 466
  • [8] A Context Dependent Fragile Watermarking Scheme for Tamper Detection from Demosaicked Color Images
    Manikandan, V. M.
    Masilamani, V.
    [J]. TENTH INDIAN CONFERENCE ON COMPUTER VISION, GRAPHICS AND IMAGE PROCESSING (ICVGIP 2016), 2016,
  • [9] Semi-fragile Watermarking-based Color Image Authentication with Recovery Capability
    Rosales-Roldan, Luis
    Cedillo-Hernandez, Manuel
    Chao, Jinhui
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 528 - 534
  • [10] Semi-Fragile Watermarking Scheme for Authentication of JPEG Images
    Lin, Chih-Hung
    Su, Tung-Shih
    Hsieh, Wen-Shyong
    [J]. JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2007, 10 (01): : 57 - 66