A ROI-BASED SEMI-FRAGILE WATERMARKING FOR IMAGE TAMPER DETECTION AND RECOVERY

被引:0
作者
Lin, Shinfeng D. [1 ]
Lin, Jia-Hong [1 ]
Chen, Chun-Yen [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien 97401, Taiwan
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2011年 / 7卷 / 12期
关键词
Tamper detection; Tamper recovery; Semi-fragile; COUNTERFEITING ATTACKS; DIGITAL WATERMARKING; SCHEME; AUTHENTICATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A ROI-based semi-fragile watermarking technique for image tamper detection and recovery is proposed. In the proposed method, the image is divided into ROI and ROB regions first. The authentication watermark is constructed based on the ROI content and embedded back to the ROI region. Recovery information is obtained from ROI and embedded to the ROB region. If the ROI region is tampered, the tampered areas can be recovered from the information embedded in ROB. The unique features of our proposed method are it is robust to both the mild modification, such as JPEG compression, and malicious attacks, such as collusion attack and counterfeiting attack. Experimental results show that our algorithm is superior to the compared technique.
引用
收藏
页码:6875 / 6888
页数:14
相关论文
共 21 条
[1]   A watermarking-based image ownership and tampering authentication scheme [J].
Chang, CC ;
Hu, YS ;
Lu, TC .
PATTERN RECOGNITION LETTERS, 2006, 27 (05) :439-446
[2]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[3]   Wavelet-based semi-fragile watermarking with tamper detection [J].
Ding, K ;
He, C ;
Jiang, LG ;
Wang, HX .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (03) :787-790
[4]   Security of fragile authentication watermarks with localization [J].
Fridrich, J .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :691-700
[5]  
Hassine A., 2009, INT MULT SYST SIGN D
[6]  
He HJ, 2006, INT J COMPUT SCI NET, V6, P251
[7]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[8]  
Hu YJ, 2004, 2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 5, PROCEEDINGS, P584
[9]   A semi-fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication [J].
Ishihara, Nozomi ;
Abe, Koki .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (05) :1045-1054
[10]  
Jiang Xuemei, 2008, Journal of Electronics, V25, P343, DOI 10.1007/s11767-006-6209-1