Dual-purpose semi-fragile watermark: Authentication and recovery of digital images

被引:17
作者
Ullah, Rafi [1 ,2 ]
Khan, Asifullah [3 ]
Malik, Aamir Saeed [1 ]
机构
[1] UTP, Dept Elect & Elect Engn, Tronoh, Perak, Malaysia
[2] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad, Pakistan
[3] PIEAS, Dept Comp & Informat Sci, Islamabad, Pakistan
关键词
TRANSFORM; SCHEME;
D O I
10.1016/j.compeleceng.2013.04.024
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a framework based on a single dual-purpose semi-fragile watermark to verify the integrity of digital image along with the recovery of distorted image. The watermark is correlated to the host image for detecting the collage attack and then embedded in their respective wavelet subbands. Unlike the conventional block-based approaches, this work has the ability to determine the unverified regions concisely. Huffman and BCH coding are utilized while generating the watermark. Integer DCT has been exploited as it can be highly compressed by Huffman coding as compared to the conventional DCT contents. The proposed technique exhibits the flexibility between imperceptibility, robustness, and capacity. In addition, integer wavelet transform has been used to reduce the computational complexity of the algorithm. Evaluation of experimental investigation shows the performance of dual-purpose semi-fragile watermark. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2019 / 2030
页数:12
相关论文
共 33 条
[1]   Compressive data hiding: An unconventional approach for improved color image coding [J].
Campisi, P ;
Kundur, D ;
Hatzinakos, D ;
Neri, A .
EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2002, 2002 (02) :152-163
[2]   Wavelet based image authentication and recovery [J].
Chamlawi, Rafiullah ;
Khan, Asifullah ;
Idris, Adnan .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (06) :795-804
[3]   Digital image authentication and recovery: Employing integer transform based information embedding and extraction [J].
Chamlawi, Rafiullah ;
Khan, Asifullah .
INFORMATION SCIENCES, 2010, 180 (24) :4909-4928
[4]   Authentication and recovery of images using multiple watermarks [J].
Chamlawi, Rafiullah ;
Khan, Asifullah ;
Usman, Imran .
COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (03) :578-584
[5]  
Chi KH, 2004, P INT C INF TECHN CO
[6]  
Cox J., 2008, DIGITAL WATERMARKING
[7]   Hiding digital watermarks using multiresolution wavelet transform [J].
Hsieh, MS ;
Tseng, DC ;
Huang, YH .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2001, 48 (05) :875-882
[8]  
Hu YP, 2005, P 4 INT C MACH LEARN
[9]   Secure discrete cosine transform based technique for recoverable tamper proofing [J].
Hung, KL ;
Chang, CC ;
Chen, TS .
OPTICAL ENGINEERING, 2001, 40 (09) :1950-1958
[10]   A semi-fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication [J].
Ishihara, Nozomi ;
Abe, Koki .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (05) :1045-1054