Digital fragile watermarking scheme for authentication of JPEG images

被引:53
|
作者
Li, CT [1 ]
机构
[1] Univ Warwick, Dept Comp Sci, Coventry CV4 7AL, W Midlands, England
来源
关键词
D O I
10.1049/ip-vis:20040812
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
It is a common practice in transform-domain fragile watermarking schemes for authentication purposes to watermark some selected transform coefficients so as to minimise embedding distortion. The author points out that leaving most of the coefficients unmarked results in a wide-open security gap for attacks to be mounted on them. A fragile watermarking scheme is proposed to implicitly watermark all the coefficients by registering the zero-valued coefficients with a key-generated binary sequence to create the watermark and involving the unwatermarkable coefficients during the embedding process of the embeddable ones. Non-deterministic dependence is established by involving some of the unwatermarkable coefficients selected according to the watermark from a nine-neighbourhood system in order to thwart different attacks, such as cover-up, vector quantisation and transplantation. No hashing is needed in establishing the non-deterministic dependence.
引用
收藏
页码:460 / 466
页数:7
相关论文
共 50 条
  • [1] Semi-Fragile Watermarking Scheme for Authentication of JPEG Images
    Lin, Chih-Hung
    Su, Tung-Shih
    Hsieh, Wen-Shyong
    [J]. JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2007, 10 (01): : 57 - 66
  • [2] Semi-fragile watermarking scheme for authentication of JPEG images
    Ho, CK
    Li, CT
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 7 - 11
  • [3] A digital authentication watermarking scheme for JPEG images with superior localization and security
    Yu Miao
    He HongJie
    Zhang JiaShu
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 491 - 509
  • [4] A digital authentication watermarking scheme for JPEG images with superior localization and security
    Miao Yu
    HongJie He
    JiaShu Zhang
    [J]. Science in China Series F: Information Sciences, 2007, 50 : 491 - 509
  • [6] Chaotic watermarking scheme for authentication of JPEG images
    Wang, Hongxia
    Ding, Ke
    Liao, Changxing
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, : 53 - +
  • [7] Fragile Watermarking-based Authentication Scheme for Demosaicked Images
    Lin, Chia-Chen
    Liu, Xiao-Long
    Lin, Cheng-Han
    Yuan, Shyan-Ming
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 97 - 100
  • [8] Image authentication scheme based on reversible fragile watermarking with two images
    Peng, Yinyin
    Niu, Xuejing
    Fu, Lei
    Yin, Zhaoxia
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 40 : 236 - 246
  • [9] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    [J]. ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [10] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    [J]. 2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174