Region of interest fragile watermarking for image authentication

被引:11
作者
Chu, Yiping [1 ]
Zhang, Yin [1 ]
Zhang, Sanyuan [1 ]
Ye, Xiuzi [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, State Key Lab CAD&CG, Hangzhou 310027, Peoples R China
来源
FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 1 | 2006年
关键词
D O I
10.1109/IMSCCS.2006.112
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Digital watermarking plays an important role in image verification and copyright protection. A watermarking scheme for authenticating ROI (region of interest) of image has been proposed in the paper. To embed the watermark in the interior of ROI, Poisson matting technique is introduced to extract the region of interest of image. The color foreground obtained by Poisson matting is converted to the binary image as reference mask. According to principles of wavelet, we construct watermark embedding function and accurately embed watermark in the interior of ROI. Exploiting watermark extraction function, we extract the watermark from watermarked image. Differentiating the values between embedding watermark and extracted watermark can detect whether ROI of image was tampered, and where was tampered. Experiment results have demonstrated that the presented watermarking scheme can detect tamper in the interior of ROI for image authentication.
引用
收藏
页码:726 / +
页数:2
相关论文
共 22 条
[1]  
ALEXANDRE HP, 2002, IEEE CAN C EL COMP E, V1, P879
[2]  
[Anonymous], P ACM SIGGRAPH
[3]   Watermark embedding: Hiding a signal within a cover image [J].
Barni, M ;
Podilchuk, CI ;
Bartolini, F ;
Delp, EJ .
IEEE COMMUNICATIONS MAGAZINE, 2001, 39 (08) :102-108
[4]   Image authentication techniques for surveillance applications [J].
Bartolini, F ;
Tefas, A ;
Barni, M ;
Pitas, I .
PROCEEDINGS OF THE IEEE, 2001, 89 (10) :1403-1418
[5]  
Boykov Y.Y., 2001, ICCV, V1, P105, DOI DOI 10.1109/ICCV.2001.937505
[6]  
Cox I. J., 2002, DIGITAL WATERMARKING
[7]  
Cox IJ, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P243, DOI 10.1109/ICIP.1996.560429
[8]  
Daubechies I., 1992, 1990 CBMSNSF C WAV A
[9]   Wavelet-based semi-fragile watermarking with tamper detection [J].
Ding, K ;
He, C ;
Jiang, LG ;
Wang, HX .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (03) :787-790
[10]  
Eric J S, 1995, IEEE COMPUT GRAPH, V15, P76