An Efficient Vector Quantization Based Watermarking Method for Image Integrity Authentication

被引:1
作者
Tiwari, Archana [1 ]
Sharma, Manisha [2 ]
机构
[1] Chhatrapati Shivaji Inst Technol, Durg, India
[2] Bhilai Inst Technol, Durg, India
来源
PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2 | 2018年 / 719卷
关键词
Image authentication; Vector quantization; Watermarking; Semi-fragile watermarking; Attack classification; Tamper detection; Tamper localization; ALGORITHM; SCHEME;
D O I
10.1007/978-981-10-3376-6_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a two-stage watermarking technique for image authentication adapting advantages of vector quantization (VQ). In the present algorithm robust watermark and semifragile watermark are embedded independently in VQ compressed image in two successive stages. Robust watermark and VQ enhances the security of the system by providing double protection to designed system. A quantitative threshold approach using pixel surrounding error pixel is suggested for identification of attacks as acceptable or malicious. Experimental results demonstrate the capabilities of the method in classifying attacks and correctly locating tamper location. It is possible to detect and determine tamper with very high sensitivity. Present scheme outperforms previous algorithms and can distinguish malicious tampering from acceptable changes, and tampered regions are localized accurately.
引用
收藏
页码:215 / 225
页数:11
相关论文
共 50 条
[21]   A multipurpose audio aggregation watermarking based on multistage vector quantization [J].
Li, Juan ;
Wang, Rangding ;
Yan, Diqun ;
Li, Youming .
MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 68 (03) :571-593
[22]   A survey on fragile watermarking based image authentication schemes [J].
Raj, N. R. Neena ;
Shreelekshmi, R. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (13) :19307-19333
[23]   A Survey of Watermarking-Based Authentication for Digital Image [J].
Lee, Chin-Feng ;
Shen, Jau-Ji ;
Chen, Zhao-Ru .
PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS), 2018, :207-211
[24]   Efficient greyscale image compression technique based on vector quantization [J].
Hu, Y. C. ;
Chuang, J. C. ;
Lo, C. C. ;
Li, C. Y. .
OPTO-ELECTRONICS REVIEW, 2011, 19 (01) :104-113
[25]   Semifragile hybrid watermarking method for image authentication [J].
Lee, Greg C. ;
Yeh, Fu-Hao .
OPTICAL ENGINEERING, 2007, 46 (05)
[26]   EFFICIENT LBG INITIALIZATION METHOD FOR IMAGE VECTOR QUANTIZATION [J].
CHENG, SM ;
LO, KT ;
LI, KC .
ELECTRONICS LETTERS, 1995, 31 (19) :1654-1656
[27]   Color image authentication using a zone-corrected error-monitoring quantization-based watermarking technique [J].
Al-Otum, Hazem Munawer .
OPTICAL ENGINEERING, 2016, 55 (08)
[28]   A novel digital image watermarking scheme based on the vector quantization technique [J].
Wu, HC ;
Chang, CC .
COMPUTERS & SECURITY, 2005, 24 (06) :460-471
[29]   Fragile watermarking for image authentication using BRINT and ELM [J].
AlShehri, Laila ;
Hussain, Muhammad ;
Aboalsamh, Hatim ;
Wadood, Abdul .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (39-40) :29199-29223
[30]   A REVIEW ON METHODS FOR IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY IN DIGITAL IMAGE WATERMARKING [J].
Vyas, Chinmay ;
Lunagaria, Munindra .
2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, :1191-1196