A Faber Schauder Dominant Blocks Based Fragile Watermarking Scheme For Image Tamper Detection

被引:0
作者
Azeroual, Assma [1 ]
Afdel, Karim [1 ]
机构
[1] Fac Sci Agadir, Comp Syst & Vis Lab, Agadir, Morocco
来源
2016 INTERNATIONAL CONFERENCE ON ELECTRICAL AND INFORMATION TECHNOLOGIES (ICEIT) | 2016年
关键词
Image authentication; Fragile watermarking; Tamper detection; Faber Schauder dominant blocks; Singular value decomposition; BINARY IMAGE; AUTHENTICATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The need of digital content authentication is increasing, due to the easier the digital content modification becomes, that is owing to the technology development. Several fragile watermarking based methods have been proposed to authenticate image. In such methods, a mark is embedded into the digital image to authenticate it. There is a few methods that deal with algorithm complexity, hence it can not be used for the applications that require low complexity such as real-time applications and video processing applications. We propose in this paper, a Faber Schauder dominant blocks based fragile watermarking scheme for image tamper detection. The Watermark was generated by applying Xor operation between a logo's bits and the bits of dominant blocks singular values of the image to authenticate. These dominant blocks are obtained by applying Faber Schauder Discrete Wavelet Transform (FSDWT) to that image. Since the image is characterized by its contours and its around textures which contain an important concentration of dominant coefficients-that form dominant blocks-, any image modification will result in a significant change of the dominant blocks singular values, which lead to detect the authenticity of the image. Furthermore, FSDWT is composed of simple operations, thus the algorithm have a low complexity. Experimental results and analysis demonstrate the effectiveness of the proposed method.
引用
收藏
页码:380 / 385
页数:6
相关论文
共 17 条
[1]  
Bhagyashri K., NANDED 2010 IEEE
[2]  
Byun SC, 2002, LECT NOTES COMPUT SC, V2613, P170
[4]  
Cox I., 2007, Digital Watermarking and Steganography
[5]  
Dang CT, 2012, IEEE IMAGE PROC, P93, DOI 10.1109/ICIP.2012.6466803
[6]   Faber-Schauder wavelet transform, application to edge detection and image characterization [J].
Douzi, H ;
Mammass, D ;
Nouboud, F .
JOURNAL OF MATHEMATICAL IMAGING AND VISION, 2001, 14 (02) :91-101
[7]   New image watermarking algorithm based on mixed scales wavelets [J].
El Hajji, Mohamed ;
Douzi, Hassan ;
Mammass, Driss ;
Harba, Rachid ;
Ros, Frederic .
JOURNAL OF ELECTRONIC IMAGING, 2012, 21 (01)
[8]  
Hajji M.E1, 2011, INT J COMPUT APPL, V28, P31
[9]  
Kim HY, 2005, LECT NOTES COMPUT SC, V3304, P125
[10]   THRESHOLD SELECTION METHOD FROM GRAY-LEVEL HISTOGRAMS [J].
OTSU, N .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1979, 9 (01) :62-66