A quadratic-residue-based fragile watermarking scheme

被引:2
作者
Chang, Chin-Chen [1 ]
Chen, Kuo-Nan [2 ]
Wang, Zhi-Hui [3 ]
Li, Ming-Chu [3 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
[3] Dalian Univ Technol, Sch Software, Liaoning, Peoples R China
来源
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL I | 2009年
关键词
image authentication; quadratic residue; vector quantization attack; IMAGE AUTHENTICATION; DIGITAL SIGNATURE; COMPRESSION;
D O I
10.1109/CCCM.2009.5268072
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new fragile watermarking scheme for image authentication and location of areas that have been tampered with is proposed in this paper. Based on a quadratic-residue theorem, the proposed scheme generates the watermark block-by-block in the cover image. To improve security by preventing malicious attacks, such as the vector quantization attack, a pseudo-random number generator using a private key as a seed is applied in the embedding process. The experimental results show that our proposed scheme is effective in image authentication and maintains high image quality in the watermarked images. In addition, areas that have been tampered with can be located and at least approximately recovered.
引用
收藏
页码:512 / +
页数:2
相关论文
共 14 条
[1]   An efficient image authentication method based on Hamming code [J].
Chan, Chi-Shiang ;
Chang, Chin-Chen .
PATTERN RECOGNITION, 2007, 40 (02) :681-690
[2]   Fragile watermarking scheme for digital image authentication using pixel difference [J].
Chang, C-C ;
Lin, P-Y ;
Chuang, J-C .
IMAGING SCIENCE JOURNAL, 2007, 55 (03) :140-147
[3]   A color image authentication method using partitioned palette and morphological operations [J].
Chang, Chin-Chen ;
Lin, Pei-Yu .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (01) :54-61
[4]   Preserving robustness and removability for digital watermarks using subsampling and difference correlation [J].
Chang, Chin-Chen ;
Lin, Pei-Yu ;
Yeh, Jieh-Shan .
INFORMATION SCIENCES, 2009, 179 (13) :2283-2293
[5]  
Chang EC, 2003, MULTIMEDIA SYST, V9, P121, DOI 10.1007/s0530-003-0083-6
[6]   Security of fragile authentication watermarks with localization [J].
Fridrich, J .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :691-700
[7]  
Fridrich J, 2000, IEEE IMAGE PROC, P446, DOI 10.1109/ICIP.2000.900991
[8]   A robust image authentication method distinguishing JPEG compression from malicious manipulation [J].
Lin, CY ;
Chang, SF .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) :153-168
[9]   Image authentication and tampering localization using distributed source coding [J].
Lin, Yao-Chung ;
Varodayan, David ;
Girod, Bernd .
2007 IEEE NINTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2007, :393-396
[10]   An image fragile watermark scheme based on chaotic image pattern and pixel-pairs [J].
Liu, Shao-Hui ;
Yao, Hong-Xun ;
Gao, Wen ;
Liu, Yong-Liang .
APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (02) :869-882