An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection

被引:27
作者
Tian, Lihua [1 ]
Zheng, Nanning [1 ]
Xue, Jianru [1 ]
Li, Ce [1 ]
Wang, Xiaofeng [1 ]
机构
[1] Xi An Jiao Tong Univ, Inst Artificial Intelligence & Robot, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
Watermarking; Image authentication; Visual saliency; Tamper detection and localization; FRAGILE WATERMARKING; SCHEME; ATTENTION;
D O I
10.1016/j.image.2011.06.001
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes an integrated visual saliency-based watermarking approach, which can be used for both synchronous image authentication and copyright protection. Firstly, regions of interest (ROIs), which are not in a fixed size and can present the most important information of one image, would be extracted automatically using the protoobject based saliency attention model. Secondly, to resist common signal processing attacks, for each ROI, an improved quantization method is employed to embed the copyright information into its DCT coefficients. Finally, the edge map of one ROI is chosen as the fragile watermark, and is then embedded into the DWT domain of the watermarked image to further resist the tampering attacks. Using ROI-based visual saliency as a bridge, this proposed method can achieve image authentication and copyright protection synchronously, and it can also preserve much more robust information. Experimental results on standard benchmark demonstrate that compared with the state-of-the-art watermarking scheme, the proposed method is more robust to white noise, filtering and JPEG compression attacks. Furthermore, it also shows that the proposed method can effectively detect tamper and locate forgery. (C) 2011 Elsevier BM. All rights reserved.
引用
收藏
页码:427 / 437
页数:11
相关论文
共 28 条
  • [1] Region of interest fragile watermarking for image authentication
    Chu, Yiping
    Zhang, Yin
    Zhang, Sanyuan
    Ye, Xiuzi
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 1, 2006, : 726 - +
  • [2] Cox I. J., 2002, Digital watermarking, V53
  • [3] Cox IJ, 1996, P IEEE INT C IM PROC, VIII, P243
  • [4] De Rosa A., 1999, Procedings ofthe 3rd Workshop of Information Hiding, P159
  • [5] Fan YC, 2008, CIRC SYST SIGNAL PR, V27, P763, DOI 10.1007/S00034-008-9055-6
  • [6] Ganic E., 2004, P 2004 WORKSHOP MULT, P166
  • [7] He HJ, 2006, LECT NOTES COMPUT SC, V4283, P422
  • [8] A model of saliency-based visual attention for rapid scene analysis
    Itti, L
    Koch, C
    Niebur, E
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1998, 20 (11) : 1254 - 1259
  • [9] Jiang GY, 2002, 2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, P1580, DOI 10.1109/ICOSP.2002.1180099
  • [10] Wavelet based image adaptive watermarking scheme
    Kaewkamnerd, N
    Rao, KR
    [J]. ELECTRONICS LETTERS, 2000, 36 (04) : 312 - 313