Dual-purpose semi-fragile watermark: Authentication and recovery of digital images

被引:17
作者
Ullah, Rafi [1 ,2 ]
Khan, Asifullah [3 ]
Malik, Aamir Saeed [1 ]
机构
[1] UTP, Dept Elect & Elect Engn, Tronoh, Perak, Malaysia
[2] COMSATS Inst Informat Technol, Dept Comp Sci, Islamabad, Pakistan
[3] PIEAS, Dept Comp & Informat Sci, Islamabad, Pakistan
关键词
TRANSFORM; SCHEME;
D O I
10.1016/j.compeleceng.2013.04.024
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a framework based on a single dual-purpose semi-fragile watermark to verify the integrity of digital image along with the recovery of distorted image. The watermark is correlated to the host image for detecting the collage attack and then embedded in their respective wavelet subbands. Unlike the conventional block-based approaches, this work has the ability to determine the unverified regions concisely. Huffman and BCH coding are utilized while generating the watermark. Integer DCT has been exploited as it can be highly compressed by Huffman coding as compared to the conventional DCT contents. The proposed technique exhibits the flexibility between imperceptibility, robustness, and capacity. In addition, integer wavelet transform has been used to reduce the computational complexity of the algorithm. Evaluation of experimental investigation shows the performance of dual-purpose semi-fragile watermark. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2019 / 2030
页数:12
相关论文
共 33 条
[11]  
Khan A, 2006, THESIS GI KHAN I ENG
[12]   Machine learning based adaptive watermark decoding in view of anticipated attack [J].
Khan, Asifullah ;
Tahir, Syed Fahad ;
Majid, Abdul ;
Choi, Tae-Sun .
PATTERN RECOGNITION, 2008, 41 (08) :2594-2610
[14]  
Kilburn D., 1997, ADWEEK
[15]  
Kim HS, 2003, LECT NOTES COMPUT SC, V2578, P145
[16]   Pediculosis [J].
Ko, CJ ;
Elston, DM .
JOURNAL OF THE AMERICAN ACADEMY OF DERMATOLOGY, 2004, 50 (01) :1-12
[17]  
Koji S, 1999, J JOHO SHORI GAKKAI, V99, P43
[18]  
Koz A., 2002, DIGITAL WATERMARKING
[19]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[20]   Digital watermarking scheme exploiting nondeterministic dependence for image authentication [J].
Li, Chang-Tsun ;
Yuan, Yinyin .
OPTICAL ENGINEERING, 2006, 45 (12)