Watermarking-based image authentication robust to JPEG compression

被引:31
作者
Preda, R. O. [1 ]
Vizireanu, D. N. [1 ]
机构
[1] Univ Politehn Bucuresti, Dept Telecommun, Bucharest, Romania
关键词
FRAGILE WATERMARKING; TAMPER DETECTION;
D O I
10.1049/el.2015.2522
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A watermarking-based image authentication scheme in the discrete cosine transform (DCT) domain robust to JPEG compression is presented. The binary authentication code is generated from a pseudorandom sequence based on a secret key and a block-dependent feature, protecting the scheme against cut-and-paste attacks. The watermark is embedded in low-frequency DCT coefficients selected by the secret key using a modified quantisation index modulation approach. Before embedding, the selected coefficients are quantised using the JPEG quantisation matrix for a selected quality factor, protecting the scheme against JPEG compression with higher quality factors. Experimental results show that the proposed technique achieves very good watermark imperceptibility and is able to detect and locate malicious attacks with good precision. Compared with other existing schemes, the proposed algorithm achieves better performance regarding false positive and false negative detection rates and in discriminating malicious attacks from JPEG compression.
引用
收藏
页码:1873 / 1874
页数:2
相关论文
共 6 条
[1]   Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique [J].
Al-Otum, Hazem Munawer .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1064-1081
[2]   Secure private fragile watermarking scheme with improved tampering localisation accuracy [J].
Bravo-Solorio, S. ;
Gan, L. ;
Nandi, A. K. ;
Aburdene, M. F. .
IET INFORMATION SECURITY, 2010, 4 (03) :137-148
[3]   Semi-Fragile Zernike Moment-Based Image Watermarking for Authentication [J].
Liu, Hongmei ;
Yao, Xinzhi ;
Huang, Jiwu .
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
[4]   Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images [J].
Phadikar, Amit ;
Maity, Santi P. ;
Mandal, Mrinal .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2012, 23 (03) :454-466
[5]   Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism [J].
Qin, Chuan ;
Chang, Chin-Chen ;
Chen, Pei-Yu .
SIGNAL PROCESSING, 2012, 92 (04) :1137-1150
[6]   Watermarking-based image authentication with recovery capability using halftoning technique [J].
Rosales-Roldan, Luis ;
Cedillo-Hernandez, Manuel ;
Nakano-Miyatake, Mariko ;
Perez-Meana, Hector ;
Kurkoski, Brian .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (01) :69-83