Block level authentication algorithm for JPEG image based on matrix coding and multi-watermarking

被引:0
作者
Gong, Dao-Fu [1 ,2 ]
Liu, Fen-Lin [1 ,2 ]
Luo, Xiang-Yang [1 ,2 ,3 ]
Wang, Ping [4 ]
机构
[1] The Fourth Institute of PLA Information Engineering University
[2] State Key Laboratory of Mathematical Engineering and Advanced Computing
[3] State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, Haidian
[4] Vega Info. and Tech Co. Ltd. of Henan Province
来源
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China | 2014年 / 43卷 / 03期
关键词
Image authentication; JPEG image; Matrix encoding; Multi-watermark;
D O I
10.3969/j.issn.1001-0548.2014.03.019
中图分类号
学科分类号
摘要
JPEG image is one of the commonly used image format. Because of the less redundant data, the length of authentication watermark for JPEG images authentication should be as short as possible. In this paper, combined with matrix encoding and multiple watermarking, a block-level authentication algorithm for JPEG images is proposed. Matrix encoding can shorten the length of the watermark magnitude and accurately locate one information change. And then multi-watermarks are generated for the tampering of the image block authentication. The detailed analysis is given about the missing rate and the false detection rate in this paper. Theoretical analysis and experimental results show that the JPEG images block-level tamper localization can be done under the lower tamper rate. The missing rate and the false detection rate are at the 10 2 level, even if 2 bits watermark are embedded in the rate of tampering is less than 5%.
引用
收藏
页码:426 / 431
页数:5
相关论文
共 10 条
  • [1] Wang G.-D., Liu F.-L., Wang P., Et al., An image authentication scheme separating tamper detection from tamper location, Chinese Journal of Computers, 30, 10, pp. 1880-1888, (2007)
  • [2] Wang G.-D., Liu F.-L., Liu Y., Et al., An image authentication scheme with discrimination of tampers on watermark or image, Acta Electronica Sinica, 36, 7, pp. 1349-1354, (2008)
  • [3] Yang C.-W., Shen J.-J., Recover the tampered image based on VQ indexing, Signal Processing, 90, pp. 331-343, (2010)
  • [4] He H.-J., Chen F., Tai H.-M., Et al., Performance analysis of a block-neighborhood based self-recovery fragile watermarking scheme, IEEE Transactions on Information Forensics And Security, 7, 1, pp. 185-196, (2012)
  • [5] Chen F., He H.-J., Wang H.-X., Variable-payload self-recovery watermarking scheme for digital image authentication, Chinese Journal of Computers, 35, 1, pp. 154-162, (2012)
  • [6] Jin X.-Z., Jiang W.-Z., Fragile watermarking capable of locating tampered of locating tampered blocks in JPEG images, Acta Electronica Sinica, 38, 7, pp. 1585-1589, (2010)
  • [7] Lin C.Y., Chang S.F., Semi-fragile watermarking for authenticating JPEG visual content, Proceedings of the SPIE: Security and Watermarking of Multimedia Contents II, 3971, pp. 140-151, (2000)
  • [8] Li B., Tao X., A new semi-fragile watermarking algorithm for image authentication, Proceeding of World Congress on Intelligent Control and Automation, pp. 5928-5932, (2008)
  • [9] Li C.T., Digital fragile watermarking scheme for authentication of JPEG images, IEE Proceedings-Vision, Image, and Signal Processing, 151, 6, pp. 460-466, (2004)
  • [10] Gao S.-Q., Zhang S.-J., Liu B., Et al., An image encryption algorithm based on four value chaoticarray, Chinese Journal of Image and Graphics, 11, 2, pp. 244-250, (2006)