Authentication of images using Zernike moment watermarking

被引:13
|
作者
Shojanazeri, Hamid [1 ]
Adnan, Wan Azizun Wan [2 ]
Ahmad, Sharifah Mumtadzah Syed [2 ]
Rahimipour, Somayeh [2 ]
机构
[1] Univ Putra Malaysia, Dept Comp & Commun Syst Engn, Serdang 43300, Selangor, Malaysia
[2] Univ Putra Malaysia, Serdang, Malaysia
关键词
Watermarking; Image authentication; Authentication; Copyright protection; Multimedia security; Image watermarking; SCHEME; ROTATION; SCALE;
D O I
10.1007/s11042-015-3018-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of the Internet and digital image modification software has invited the illegal access to and use of digital images. In response, digital watermarking has emerged as a unique tool for protecting the authenticity of digital images. This technique involves the insertion of an imperceptible message within the media. This paper proposes a semi-fragile watermarking system using content-based techniques that address the challenge of image authentication. The proposed algorithm exploits the Zernike moments to authenticate an image and the Sobel edge map to perform tamper detection. The main contributions of this work are the establishment of an authentication algorithm that is robust against scaling, translation, noise pollution, rotation and JPEG compression, which are considered to be non-malicious modifications, while significantly decreasing the computational complexity using optimum orders of Zernike moments. In addition, this work addresses the challenge of capacity in terms of watermark insertion while preserving the visual quality of the image, where the capacity is increased almost three fold, as shown in the results. This process can successfully distinguish malicious attacks and reject modifications to watermarked images made through additions, replacements, and image cropping.
引用
收藏
页码:577 / 606
页数:30
相关论文
共 50 条
  • [31] A Multi Block Entropy Based Blind Watermarking Method Using Region Detection Approach for Authentication of Medical Images
    Koyun, Arif
    Macit, Huseyin Bilal
    JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2019, 14 (04) : 573 - 582
  • [32] Robust image watermarking using local Zernike moments
    Singhal, Nitin
    Lee, Young-Yoon
    Kim, Chang-Su
    Lee, Sang-Uk
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2009, 20 (06) : 408 - 419
  • [33] Watermarking-based Self-Recovery and Authentication Framework for Colour Images
    Molina, J.
    Ponomaryov, V.
    Reyes, R.
    Cruz, C.
    2019 7TH INTERNATIONAL WORKSHOP ON BIOMETRICS AND FORENSICS (IWBF), 2019,
  • [34] A zero-watermarking approach for DICOM images authentication based on Jacobian model
    Tayachi, Mayssa
    Nana, Laurent
    Pascu, Anca
    Benzarti, Faouzi
    INFORMATION SECURITY JOURNAL, 2024, 33 (05): : 508 - 527
  • [35] Digital images authentication scheme based on bimodal biometric watermarking in an independent domain
    Wojtowicz, Wioletta
    Ogiela, Marek R.
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2016, 38 : 1 - 10
  • [36] Reversible authentication and cross-recovery of images using (t, n)-threshold and modified-RCM watermarking
    Chen, Yeh-Shun
    Wang, Ran-Zan
    OPTICS COMMUNICATIONS, 2011, 284 (12) : 2711 - 2719
  • [37] Toward Authentication of Videos: Integer Transform Based Motion Vector Watermarking
    Ullah, Rafi
    Khan, Sultan Daud
    Ullah, Mohib
    Al-Machot, Fadi
    Ullah, Habib
    IEEE ACCESS, 2022, 10 : 75063 - 75073
  • [38] ROBUST WATERMARKING USING HAND GESTURE FOR ENHANCED AUTHENTICATION
    Seng, Woo Chaw
    Fong, Leong Lai
    Shing, Ng Liang
    Noudeh, Saied Ali Hosseini
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2011, 24 (02) : 98 - 110
  • [39] Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain
    Preda, Radu Ovidiu
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [40] A multiple reversible watermarking technique for fingerprint authentication
    Joshi, Vaibhav B.
    Raval, Mehul S.
    Gupta, Dhruv
    Rege, Priti P.
    Parulkar, S. K.
    MULTIMEDIA SYSTEMS, 2016, 22 (03) : 367 - 378