A secure hierarchical fragile watermarking method with tamper localization

被引:2
作者
Zhang, Xianhai [1 ]
Yang, Yongtian [1 ]
Zhu, Yan [2 ]
机构
[1] Harbin Engn Univ, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
[2] Peking Univ, Inst Comp Sci & Technol, Beijing 100871, Peoples R China
来源
FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2 | 2006年
关键词
fragile watermarking; hierarchical structure; image authentication; tamper detection; tamper localization;
D O I
10.1109/IMSCCS.2006.168
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Several image authentication schemes are either vulnerable to attacks or sacrifice localization accuracy to improve security. In this paper, we proposed a scheme that not only thwarts all kinds of-attacks such as vector quantization (VQ) and oracle attack in order to satisfy the security but also ensures superior accuracy of tamper localization. It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be ensured. That is, if a tampered pixel is not detected in level-4, it will be detected in level 3, level 2 or level I with a probability of nearly 1. The method can detect any tampered pixel and the size of 2 x 2 pixel block with a missing rate less than 0.78% and 0.19% respectively, and the missing rate of more than or equal the size of 4 x 4 pixel block is approximately close to 0. Experimental results demonstrate that the proposed scheme is highly sensitive to intentional tampering and the embedding watermarking is imperceptive.
引用
收藏
页码:69 / +
页数:2
相关论文
共 50 条
  • [31] An Efficient Image Self-recovery and Tamper Detection Using Fragile Watermarking
    Dadkhah, Sajjad
    Abd Manaf, Azizah
    Sadeghi, Somayeh
    IMAGE ANALYSIS AND RECOGNITION, ICIAR 2014, PT I, 2014, 8814 : 504 - 513
  • [32] An efficient encoding based watermarking technique for tamper detection and localization
    Hussan, Muzamil
    Gull, Solihah
    Parah, Shabir A.
    Qureshi, G. J.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (24) : 37249 - 37271
  • [33] Fuzzy Transforms and Fragile Watermarking Tamper Detection on Coded Images
    Di Martino, Ferdinando
    Sessa, Salvatore
    PROCEEDINGS OF THE 7TH CONFERENCE OF THE EUROPEAN SOCIETY FOR FUZZY LOGIC AND TECHNOLOGY (EUSFLAT-2011) AND LFA-2011, 2011, : 444 - 451
  • [34] An efficient watermarking technique for tamper detection and localization of medical images
    Gull, Solihah
    Loan, Nazir A.
    Parah, Shabir A.
    Sheikh, Javaid A.
    Bhat, G. M.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (05) : 1799 - 1808
  • [35] Logistic-map based fragile image watermarking scheme for tamper detection and localization
    Sahu, Aditya Kumar
    Hassaballah, M.
    Rao, Routhu Srinivasa
    Suresh, Gulivindala
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (16) : 24069 - 24100
  • [36] A Novel Semi-Fragile Watermarking Algorithm with Tamper Localization and Self-Recovery
    Chao, Yan
    Liu, Shuying
    Liu, Huaming
    PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 186 - 190
  • [37] Semi-fragile watermarking for tamper detection
    Lin, KZ
    Xiong, CF
    Ma, Q
    Sun, H
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON INSTRUMENTATION SCIENCE AND TECHNOLOGY, VOL 2, 2004, : 193 - 198
  • [38] Dual image-based reversible fragile watermarking scheme for tamper detection and localization
    Sahu, Aditya Kumar
    Sahu, Monalisa
    Patro, Pramoda
    Sahu, Gupteswar
    Nayak, Soumya Ranjan
    PATTERN ANALYSIS AND APPLICATIONS, 2023, 26 (02) : 571 - 590
  • [39] Dual image-based reversible fragile watermarking scheme for tamper detection and localization
    Aditya Kumar Sahu
    Monalisa Sahu
    Pramoda Patro
    Gupteswar Sahu
    Soumya Ranjan Nayak
    Pattern Analysis and Applications, 2023, 26 : 571 - 590
  • [40] Fragile watermarking tamper detection with images compressed by fuzzy transform
    Di Martino, Ferdinando
    Sessa, Salvatore
    INFORMATION SCIENCES, 2012, 195 : 62 - 90