Novel semi-fragile watermarking algorithm for image content authentication

被引:0
作者
Wang, You-Wei [1 ]
Liu, Yuan-Ning [1 ]
Zhu, Xiao-Dong [1 ]
机构
[1] Department of Computer Science and Technology, Jilin University
来源
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science) | 2013年 / 47卷 / 06期
关键词
Image authentication; Noise filtering; Semi-fragile watermarking; Slant transform;
D O I
10.3785/j.issn.1008-973X.2013.06.006
中图分类号
学科分类号
摘要
A novel semi-fragile watermarking algorithm was proposed to improve the accuracy of image content authentication. This algorithm introduced the conception of relevant-block-group, and divided each relevant-block-group into several sub-block-groups, generated the watermark information by using the particular block of the each sub-block-group by turn, finally, embedded the watermark into the other blocks of the sub-block-group. This algorithm selected the watermark quantization steps self-adaptively according to the content feature of the host image, finished the embedding process by combining the high energy concentration of the Slant transform and the principal of direct current coefficient quantization. Moreover, a noble noise-filtering strategy was proposed, and the voting method was applied to position the tampered area in the authentication process. Experimental results show that the proposed algorithm can improve the quality of the watermarked image effectively and prevent the watermark detection without authentication, and it can also significantly enhance the positioning accuracy when facing with conventional treatments, such as cutting, replacing, and etc. The algorithm has good ability of resisting accidental attacks, and the new noise strategy improves the recognition effect of the tampered region effectively.
引用
收藏
页码:969 / 976
页数:7
相关论文
共 15 条
  • [1] Maeno K., Sun Q., Chang S., Et al., New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization, IEEE Transactions on Multimedia, 8, 1, pp. 32-45, (2006)
  • [2] Lin C.Y., Chang S.F., A robust image authentication method distinguish JPEG compression from malicious manipulation, IEEE Transaction on Circuits and Systems of Video Technology, 11, 2, pp. 153-168, (2001)
  • [3] Lin C.H., Su T.S., Hsieh W.S., Semi-fragile watermarking scheme for authentication of JPEG images, Tamkang Journal of Science and Engineering, 10, 1, pp. 57-66, (2007)
  • [4] Ko C.C., Huang C.H., A novel semi-fragile watermarking technique for image authentication, Proceeding Sixth IASTED International Conference on Signal and Image Processing, pp. 2282-2285, (2004)
  • [5] Piva A., Bartolini F., Caldelli R., Self-recovery authentication of images in the DWT domain, International Journal of Image and Graphics, 5, 1, pp. 149-65, (2005)
  • [6] Wang X.-Y., Chen L.-K., A novel adaptive semi-fragile watermarking scheme based on image content, Acta Automatica Sinica, 33, 4, pp. 361-366, (2007)
  • [7] Duan G.-D., Zhao X., Li J.-P., Et al., A novel semi-fragile digital watermarking algorithm for image content authentication, localization and recover, Chinese Journal of Electronics, 38, 4, pp. 842-847, (2010)
  • [8] Xiao J.-Q., Xing X., A quantization-based semi-fragile watermarking scheme for image content authentication, Journal of Visual Communication and Image Representation, 22, 2, pp. 187-200, (2011)
  • [9] Hou Z.X., Xu N.N., Chen H., Et al., Fast slant transform with sequency increment and its application in image compression, International Conference on Signal Processing, pp. 65-68, (2004)
  • [10] Ho T.S., Zhu X.Z., A slant transform watermarking for copyright protection of satellite images, Proceedings of the 2003 Joint Conference of the Fourth International Conference on Information, Communications and Signal Processing, pp. 1178-1181, (2003)