Image authentication and recovery scheme based on watermarking technique

被引:0
作者
Sumitomo, Kenji [1 ]
Nakano, Mariko [2 ]
Perez, Hector [2 ]
机构
[1] Univ Electrocommun, Fac Informat & Comp Engn, Chofugaoka 1-5-1, Chofu, Tokyo 182, Japan
[2] Natl Polytech Inst, Grad Sect ESIME Culhuacan, Mexico City 1000, DF, Mexico
来源
PROCEEDINGS OF THE 2ND WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: MODERN TOPICS OF COMPUTER SCIENCE | 2008年
关键词
image authentication; recovery; watermarking; DCT; JPEG compression; blocks of interest;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Actually digital images are used to show some important evidences, however once they are propagated through an open channel such as Internet, these images are easy targets of malicious modification. In this paper, we propose a watermarking based image authentication scheme, in which owner's blocks of interest are authenticated using embedded watermark. If the scheme determined that these blocks were modified intentionally, the resume of the original version of these blocks is recovered without any additional information. Also the embedded watermarks are enough robust to no-intentional attacks, such as JPEG compression and noise contamination. In the watermark embedding process, watermark sequence is extracted from the blocks of interest of the image and it is embedded into the corresponding DCT blocks indicated by a previously generated mapping list. In the authentication and recovery process, the watermark sequence is extracted from the corresponding DCT blocks and then it is compared with the sequence extracted from the blocks of interest to determine its authenticity. The proposed system use only a secret key to generate the mapping list to map owner's blocks of interest and other blocks. The evaluation results show efficient authentication and recovery capacity of the proposed scheme.
引用
收藏
页码:94 / +
页数:2
相关论文
共 10 条
[1]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[2]   A robust image authentication method distinguishing JPEG compression from malicious manipulation [J].
Lin, CY ;
Chang, SF .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) :153-168
[3]   Hierarchical watermarking scheme for image authentication and recovery [J].
Lin, PL ;
Hsieh, CK ;
Huang, PW .
2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, :963-966
[4]  
LIN PL, 2004, P IEEE 6 INT S MULT, P146
[5]   Fault resilient and compression tolerant digital signature for image authentication [J].
Lou, DC ;
Liu, JL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :31-39
[6]   Structural digital signature for image authentication: An incidental distortion resistant scheme [J].
Lu, CS ;
Liao, HYM .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (02) :161-173
[7]   Multipurpose image watermarking algorithm based on multistage vector quantization [J].
Lu, ZM ;
Xu, DG ;
Sun, SH .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (06) :822-831
[8]   New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization [J].
Maeno, K ;
Sun, QB ;
Chang, SF ;
Suto, M .
IEEE TRANSACTIONS ON MULTIMEDIA, 2006, 8 (01) :32-45
[9]  
TSAI P, 2005, INT C INF COMM SIGN, P865
[10]  
Wong PW, 2001, IEEE T IMAGE PROCESS, V10, P1593, DOI 10.1109/83.951543