Authentication of images using Zernike moment watermarking

被引:13
|
作者
Shojanazeri, Hamid [1 ]
Adnan, Wan Azizun Wan [2 ]
Ahmad, Sharifah Mumtadzah Syed [2 ]
Rahimipour, Somayeh [2 ]
机构
[1] Univ Putra Malaysia, Dept Comp & Commun Syst Engn, Serdang 43300, Selangor, Malaysia
[2] Univ Putra Malaysia, Serdang, Malaysia
关键词
Watermarking; Image authentication; Authentication; Copyright protection; Multimedia security; Image watermarking; SCHEME; ROTATION; SCALE;
D O I
10.1007/s11042-015-3018-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of the Internet and digital image modification software has invited the illegal access to and use of digital images. In response, digital watermarking has emerged as a unique tool for protecting the authenticity of digital images. This technique involves the insertion of an imperceptible message within the media. This paper proposes a semi-fragile watermarking system using content-based techniques that address the challenge of image authentication. The proposed algorithm exploits the Zernike moments to authenticate an image and the Sobel edge map to perform tamper detection. The main contributions of this work are the establishment of an authentication algorithm that is robust against scaling, translation, noise pollution, rotation and JPEG compression, which are considered to be non-malicious modifications, while significantly decreasing the computational complexity using optimum orders of Zernike moments. In addition, this work addresses the challenge of capacity in terms of watermark insertion while preserving the visual quality of the image, where the capacity is increased almost three fold, as shown in the results. This process can successfully distinguish malicious attacks and reject modifications to watermarked images made through additions, replacements, and image cropping.
引用
收藏
页码:577 / 606
页数:30
相关论文
共 50 条
  • [1] Authentication of images using Zernike moment watermarking
    Hamid Shojanazeri
    Wan Azizun Wan Adnan
    Sharifah Mumtadzah Syed Ahmad
    Somayeh Rahimipour
    Multimedia Tools and Applications, 2017, 76 : 577 - 606
  • [2] Authentication and Tamper Detection in Images Using Dual Watermarking Approach
    Saiyyad, Mohmmad Ali M.
    Patil, Nitin N.
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [3] Robust Video Watermarking Using Normalized Zernike Moments
    Chen, Shiyi
    Chen, Yi
    Chen, Yanli
    Zhou, Limengnan
    Wu, Hanzhou
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 323 - 336
  • [4] Watermarking technologies for authentication and protection of images
    Macq, B
    Dugelay, JL
    ANNALS OF TELECOMMUNICATIONS, 2000, 55 (3-4) : 92 - 100
  • [5] Blind Dual Watermarking for Color Images' Authentication and Copyright Protection
    Liu, Xiao-Long
    Lin, Chia-Chen
    Yuan, Shyan-Ming
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2018, 28 (05) : 1047 - 1055
  • [6] A Zernike Moment Based Rotational Invariant Watermarking Scheme
    Fahmy, M. F.
    Raheem, G. M. Abdel
    Thabet, M. A.
    2013 30TH NATIONAL RADIO SCIENCE CONFERENCE (NRSC2013), 2013, : 228 - 235
  • [7] An Enhanced Bspline Based Zernike Moment Evaluations With Watermarking Applications
    Fahmy, M. F.
    Thabet, M. A.
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 186 - 191
  • [8] A Fragile Watermarking Algorithm for Hologram Authentication
    Cheng, Chau-Jern
    Hwang, Wen-Jyi
    Zeng, Han-Yi
    Lin, Yu-Chih
    JOURNAL OF DISPLAY TECHNOLOGY, 2014, 10 (04): : 263 - 271
  • [9] Reversible watermarking for authentication of DICOM images
    Zain, JM
    Baldwin, LP
    Clarke, M
    PROCEEDINGS OF THE 26TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-7, 2004, 26 : 3237 - 3240
  • [10] Holographic watermarking for authentication of cut images
    Spagnolo, Giuseppe Schirripa
    De Santis, Michele
    OPTICS AND LASERS IN ENGINEERING, 2011, 49 (12) : 1447 - 1455