An Efficient Vector Quantization Based Watermarking Method for Image Integrity Authentication

被引:1
作者
Tiwari, Archana [1 ]
Sharma, Manisha [2 ]
机构
[1] Chhatrapati Shivaji Inst Technol, Durg, India
[2] Bhilai Inst Technol, Durg, India
来源
PROGRESS IN INTELLIGENT COMPUTING TECHNIQUES: THEORY, PRACTICE, AND APPLICATIONS, VOL 2 | 2018年 / 719卷
关键词
Image authentication; Vector quantization; Watermarking; Semi-fragile watermarking; Attack classification; Tamper detection; Tamper localization; ALGORITHM; SCHEME;
D O I
10.1007/978-981-10-3376-6_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a two-stage watermarking technique for image authentication adapting advantages of vector quantization (VQ). In the present algorithm robust watermark and semifragile watermark are embedded independently in VQ compressed image in two successive stages. Robust watermark and VQ enhances the security of the system by providing double protection to designed system. A quantitative threshold approach using pixel surrounding error pixel is suggested for identification of attacks as acceptable or malicious. Experimental results demonstrate the capabilities of the method in classifying attacks and correctly locating tamper location. It is possible to detect and determine tamper with very high sensitivity. Present scheme outperforms previous algorithms and can distinguish malicious tampering from acceptable changes, and tampered regions are localized accurately.
引用
收藏
页码:215 / 225
页数:11
相关论文
共 50 条
[41]   DCT based efficient fragile watermarking scheme for image authentication and restoration [J].
Durgesh Singh ;
Sanjay K. Singh .
Multimedia Tools and Applications, 2017, 76 :953-977
[42]   A Survey of Transform Domain based Semifragile Watermarking Schemes for Image Authentication [J].
Tiwari, A. ;
Sharma, M. .
Journal of The Institution of Engineers (India): Series B, 2012, 93 (03) :185-191
[43]   Image authentication and recovery scheme based on watermarking technique [J].
Sumitomo, Kenji ;
Nakano, Mariko ;
Perez, Hector .
PROCEEDINGS OF THE 2ND WSEAS INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: MODERN TOPICS OF COMPUTER SCIENCE, 2008, :94-+
[44]   Tampering with a watermarking-based image authentication scheme [J].
Phan, Raphael C. -W. .
PATTERN RECOGNITION, 2008, 41 (11) :3493-3496
[45]   Fragile watermarking schemes for image authentication: a survey [J].
Sreenivas, K. ;
Kamkshi Prasad, V. .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2018, 9 (07) :1193-1218
[46]   A survey on fragile watermarking based image authentication schemes [J].
N. R. Neena Raj ;
R. Shreelekshmi .
Multimedia Tools and Applications, 2021, 80 :19307-19333
[47]   An Effective Semi-fragile Watermarking Method for Image Authentication Based on Lifting Wavelet Transform and Feed-Forward Neural Network [J].
Haghighi, Behrouz Bolourian ;
Taherinia, Amir Hossein ;
Monsefi, Reza .
COGNITIVE COMPUTATION, 2020, 12 (04) :863-890
[48]   A novel tamper detection watermarking approach for improving image integrity [J].
AlShaikh, Muath .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (07) :10039-10060
[49]   An image authentication scheme based on digital watermarking and image secret sharing [J].
Hsieh, Shang-Lin ;
Tsai, I-Ju ;
Yeh, Chung-Ping ;
Chang, Chia-Ming .
MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) :597-619
[50]   An image authentication scheme based on digital watermarking and image secret sharing [J].
Shang-Lin Hsieh ;
I-Ju Tsai ;
Chung-Ping Yeh ;
Chia-Ming Chang .
Multimedia Tools and Applications, 2011, 52 :597-619