Face region authentication and recovery system based on SPIHT and watermarking

被引:0
作者
Cruz-Ramos, Clara [1 ]
Nakano-Miyatake, Mariko [1 ]
Perez-Meana, Hector [1 ]
Reyes-Reyes, Rogelio [1 ]
Rosales-Roldan, Luis [1 ]
机构
[1] Inst Politecn Nacl, Mech Elect Engn Sch, Mexico City, DF, Mexico
关键词
Face detection; Tamper detection; Self-recovery; Watermarking; SPIHT; QIM; SEMI-FRAGILE WATERMARKING; IMAGE TAMPER DETECTION; HALF-TONING TECHNIQUE;
D O I
10.1007/s11042-014-2006-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The face regions of digital pictures are some of the principal target of tampering to generate a potential scandal, causing social and economic damages to involved persons. In this paper, we propose a face region authentication and recovery system, in which the face regions are automatically protected at the moment when the picture is taken by a digital camera. When the original face of the picture is replaced by another face by malicious person, the system can detect the tampered face and recover the original one. The proposed system consists of two stages: the face region protection stage and the face region tamper detection and recovery stage. In both stages, the face detection module based on the Viola-Jones algorithm, face region encoding/decoding modules based on the Set Partitioning in Hierarchical Trees (SPIHT) algorithm and watermarking module based on Quantization Index Modulation (QIM) are used. These three algorithms, Viola-Jones detector, SPIHT and QIM, are determined as most adequate algorithms for proposed system after several evaluations. The experimental results show a high quality of the watermarked as well as the recovered images, obtaining average Peak Signals to Noise Ratios (PSNR) of more than 40 and 38 dB, respectively.
引用
收藏
页码:7685 / 7709
页数:25
相关论文
共 23 条
  • [11] Lin SFD, 2011, INT J INNOV COMPUT I, V7, P6875
  • [12] Self embedding watermarking using halftoning technique
    Luo, Hao
    Chu, Shu-Chuan
    Lu, Zhe-Ming
    [J]. CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2008, 27 (02) : 155 - 170
  • [13] Mingju Chen, 2010, Proceedings of the 2010 2nd International Conference on Signal Processing Systems (ICSPS 2010), P621, DOI 10.1109/ICSPS.2010.5555738
  • [14] Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images
    Phadikar, Amit
    Maity, Santi P.
    Mandal, Mrinal
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2012, 23 (03) : 454 - 466
  • [15] Watermarking-based image authentication with recovery capability using halftoning technique
    Rosales-Roldan, Luis
    Cedillo-Hernandez, Manuel
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    Kurkoski, Brian
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2013, 28 (01) : 69 - 83
  • [16] A new, fast, and efficient image codec based on set partitioning in hierarchical trees
    Said, A
    Pearlman, WA
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 1996, 6 (03) : 243 - 250
  • [17] Performance analysis on a watermarking method based on double random phase encoding technique
    Sang, Jun
    Zhang, Bing
    Hong, Daxiang
    Xiang, Hong
    Xu, Hongsheng
    Sang, Nong
    [J]. OPTIK, 2013, 124 (24): : 6512 - 6515
  • [18] Rapid object detection using a boosted cascade of simple features
    Viola, P
    Jones, M
    [J]. 2001 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2001, : 511 - 518
  • [19] Robust real-time face detection
    Viola, P
    Jones, MJ
    [J]. INTERNATIONAL JOURNAL OF COMPUTER VISION, 2004, 57 (02) : 137 - 154
  • [20] Hybrid additive multi-watermarking and decoding
    Wang, Jinwei
    Lian, Shiguo
    Wang, Jin
    [J]. MULTIMEDIA SYSTEMS, 2015, 21 (04) : 345 - 361