A secure hierarchical fragile watermarking method with tamper localization

被引:2
作者
Zhang, Xianhai [1 ]
Yang, Yongtian [1 ]
Zhu, Yan [2 ]
机构
[1] Harbin Engn Univ, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
[2] Peking Univ, Inst Comp Sci & Technol, Beijing 100871, Peoples R China
来源
FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2 | 2006年
关键词
fragile watermarking; hierarchical structure; image authentication; tamper detection; tamper localization;
D O I
10.1109/IMSCCS.2006.168
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Several image authentication schemes are either vulnerable to attacks or sacrifice localization accuracy to improve security. In this paper, we proposed a scheme that not only thwarts all kinds of-attacks such as vector quantization (VQ) and oracle attack in order to satisfy the security but also ensures superior accuracy of tamper localization. It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be ensured. That is, if a tampered pixel is not detected in level-4, it will be detected in level 3, level 2 or level I with a probability of nearly 1. The method can detect any tampered pixel and the size of 2 x 2 pixel block with a missing rate less than 0.78% and 0.19% respectively, and the missing rate of more than or equal the size of 4 x 4 pixel block is approximately close to 0. Experimental results demonstrate that the proposed scheme is highly sensitive to intentional tampering and the embedding watermarking is imperceptive.
引用
收藏
页码:69 / +
页数:2
相关论文
共 50 条
  • [21] Fragile watermarking tamper detection via bilinear fuzzy relation equations
    Ferdinando Di Martino
    Salvatore Sessa
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2041 - 2061
  • [22] Hierarchical watermarking for secure image authentication with localization
    Celik, MU
    Sharma, G
    Saber, E
    Tekalp, AM
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) : 585 - 595
  • [23] Reversible Fragile Watermarking for Fine-Grained Tamper Localization in Spatial Data
    Lan, Hai
    Peng, Yuwei
    DATABASES THEORY AND APPLICATIONS, ADC 2017, 2017, 10538 : 233 - 247
  • [24] A logistic map based blind and fragile watermarking for tamper detection and localization in images
    Aditya Kumar Sahu
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 3869 - 3881
  • [25] A Fragile Watermarking Scheme for Tamper Detection of Data Cubes
    Xu, Qiao-li
    Guo, Jie
    Xu, Peng
    Qiu, Wei-dong
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, MACHINERY AND MATERIALS (IIMM 2015), 2015, : 329 - 333
  • [26] AN EFFICIENT BLOCK-BASED FRAGILE WATERMARKING SYSTEM FOR TAMPER LOCALIZATION AND RECOVERY
    Edupuganti, Venkata Gopal
    Shin, Frank Y.
    Chang, I-Cheng
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02) : 257 - 267
  • [27] A logistic map based blind and fragile watermarking for tamper detection and localization in images
    Sahu, Aditya Kumar
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 13 (8) : 3869 - 3881
  • [28] Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
    Chang, Chin-Chen
    Fan, Yi-Hsuan
    Tai, Wei-Liang
    PATTERN RECOGNITION, 2008, 41 (02) : 654 - 661
  • [29] HIERARCHICAL FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Lin, Shinfeng D.
    Yang, Zong-Lin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02) : 245 - 255
  • [30] Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet
    Azeroual, Assma
    Afdel, Karim
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2017, 79 : 207 - 218