An improved block dependent fragile image watermark

被引:0
|
作者
Liu, FL [1 ]
Wang, YS [1 ]
机构
[1] Chinese Acad Sci, Inst Automat, Natl Lab Pattern Recognit, Beijing 100080, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Surrounding neighbor blocks dependent fragile watermark scheme has its disadvantages, which couldn't successfully distinguish where the image has been tampered. In this paper, we propose a random block dependant fragile image watermark scheme. Two series, one is generated by this block and its prior block, the other is generated by this block itself, are embedded into the LSBs of this image block to keep itself secure and dependent on its prior block, which make VQ attack impossible. Decision strategy is implemented to detect whether the image blocks are authentic in tamper detection. Analysis and experimental results demonstrate that our algorithm can detect even one bit image alteration with graceful localization, and successfully resist vector quantization attack simultaneously without the need of any unique keys or image indexes.
引用
收藏
页码:501 / 504
页数:4
相关论文
共 50 条
  • [11] Using two semi-fragile watermark for image authentication
    Hu, YP
    Han, DZ
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 5484 - 5489
  • [12] A secure image authentication scheme based on dual fragile watermark
    Xinhui Gong
    Lei Chen
    Feng Yu
    Xiaohong Zhao
    Shihong Wang
    Multimedia Tools and Applications, 2020, 79 : 18071 - 18088
  • [13] A secure image authentication scheme based on dual fragile watermark
    Gong, Xinhui
    Chen, Lei
    Yu, Feng
    Zhao, Xiaohong
    Wang, Shihong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (25-26) : 18071 - 18088
  • [14] Method of generating robust image zero-watermark and fragile watermark based on singular value
    Li, Shao-Hua
    Feng, Jing-Ying
    Lou, Ou-Jun
    Jing, Yu
    Metallurgical and Mining Industry, 2015, 7 (09): : 740 - 744
  • [15] A REVERSIBLE IMAGE AUTHENTICATION SCHEME BASED ON CHAOTIC FRAGILE WATERMARK
    Xiao, Di
    Shih, Frank Y.
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (10): : 4731 - 4742
  • [16] Stochastic image warping for improved watermark desynchronization
    D'Angelo A.
    Barni M.
    Merhav N.
    EURASIP Journal on Information Security, 2008 (1):
  • [17] An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
    Liu, Shao-Hui
    Yao, Hong-Xun
    Gao, Wen
    Liu, Yong-Liang
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (02) : 869 - 882
  • [18] Fragile Watermark in Medical Image Based on Prime Number Distribution Theory
    Xiuyuan Wei
    Wenyin Zhang
    Bo Yang
    Jiuru Wang
    Ziyun Xia
    Journal of Digital Imaging, 2021, 34 : 1447 - 1462
  • [19] Fragile Watermark in Medical Image Based on Prime Number Distribution Theory
    Wei, Xiuyuan
    Zhang, Wenyin
    Yang, Bo
    Wang, Jiuru
    Xia, Ziyun
    JOURNAL OF DIGITAL IMAGING, 2021, 34 (06) : 1447 - 1462
  • [20] Fragile authentication watermark combined with image feature and public key cryptography
    Li, XQ
    Xue, XY
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2286 - 2289