A semi-fragile watermarking scheme using weighted vote with sieve and emphasis for image authentication

被引:11
作者
Ishihara, Nozomi [1 ]
Abe, Koki [1 ]
机构
[1] Univ Electrocommun, Dept Comp Sci, Chofu, Tokyo 1828585, Japan
关键词
watermarking; DWT semi-fragile; authentication; tamper-proofing;
D O I
10.1093/ietfec/e90-a.5.1045
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against tampering. The watermark image for authentication is reconstructed by taking a weighted vote on the extracted bits.,The bits that lose the vote are treated as having been tampered with, and the locations of the lost bits as indicating tampered positions. Thus, authentication and tamper-proofing can be done by observing the images of watermarks that win and lose votes. Sieving, emphasis, and weighted vote were found to be effectively make the authentication and tamper detection more accurate. The proposed scheme is robust against JPEG compression or acceptable modifications, but sensitive to malicious attacks such as cutting and pasting.
引用
收藏
页码:1045 / 1054
页数:10
相关论文
共 16 条
[1]  
CHI KH, 2004, P 2004 IEEE INT C IN, V1, P7
[2]   Wavelet-based semi-fragile watermarking with tamper detection [J].
Ding, K ;
He, C ;
Jiang, LG ;
Wang, HX .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (03) :787-790
[3]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441
[4]   Hiding digital watermarks using multiresolution wavelet transform [J].
Hsieh, MS ;
Tseng, DC ;
Huang, YH .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2001, 48 (05) :875-882
[5]  
ISHIHARA N, 2005, P 2 INT C INT COMP I, P590
[6]  
Ko CC, 2004, PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, P24
[7]   Digital watermarking for telltale tamper proofing and authentication [J].
Kundur, D ;
Hatzinakos, D .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1167-1180
[8]  
OZGUR E, 2004, J ELECTRON IMAGING, V13, P209
[9]  
SEO YH, 2004, IEICE T FUND ELECTR, V87, P1374
[10]  
SHIN DH, 2003, P INT C SEC MAN SAM, V2, P577