Transform Domain Fragile Watermarking Using Fermat Number Transform

被引:0
作者
Rao, Varuna K. M. [1 ]
Ghanekar, Umesh [1 ]
机构
[1] NIT, Dept Elect & Commun, Kurukshetra, Haryana, India
来源
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2015年
关键词
Fragile watermarking; Fermat number transform; Authentication;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a transform domain fragile watermarking technique based on Fermat number transform (FNT). This transform domain is very simple and efficient in terms of computational complexity and speed. FNT is a true digital transform, which makes the watermarking method free from round-off errors. In this method, the image is divided into non-overlapping blocks and FNT is applied on each block. The transformed coefficients are then quantized and embedded by the watermark bits. Finally, inverse FNT is taken and all the blocks are combined together. This method has eight variations depending on the fragility requirements. Depending upon the requirement of fragility and PSNR different variants of this method can be used.
引用
收藏
页码:749 / 753
页数:5
相关论文
共 9 条
[1]  
Cheng Chau-Jern, 2013, J DISP TECHNOL, V20, P263
[2]  
Elliott D.F., 1982, Fast Transforms: Algorithms, Analyses, Applications
[3]   Fragile watermarking based on encoding of the zeroes of the z-transform [J].
Ho, Anthony T. S. ;
Zhu, Xunzhan ;
Shen, Jun ;
Marziliano, Pina .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) :567-569
[4]   Image Integrity Authentication Scheme Based on Fixed Point Theory [J].
Li, Xu ;
Sun, Xingming ;
Liu, Quansheng .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (02) :632-645
[5]   Reversible watermarking utilising weighted median-based prediction [J].
Naskar, R. ;
Chakraborty, R. S. .
IET IMAGE PROCESSING, 2012, 6 (05) :507-520
[6]  
ORuanaidh JJK, 1997, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL I, P536, DOI 10.1109/ICIP.1997.647968
[7]   Scalable fragile watermarking for image authentication [J].
Piper, Angela ;
Safavi-Naini, Reihaneh .
IET INFORMATION SECURITY, 2013, 7 (04) :300-311
[8]   Fragile and blind watermarking technique based on Weber's law for medical image authentication [J].
Walia, Ekta ;
Suneja, Anu .
IET COMPUTER VISION, 2013, 7 (01) :9-19
[9]   An invisible watermarking technique for image verification [J].
Yeung, MM ;
Mintzer, F .
INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL II, 1997, :680-683