Face region authentication and recovery system based on SPIHT and watermarking

被引:0
作者
Clara Cruz-Ramos
Mariko Nakano-Miyatake
Hector Perez-Meana
Rogelio Reyes-Reyes
Luis Rosales-Roldan
机构
[1] Instituto Politécnico Nacional,Mechanical Electrical Engineering School
来源
Multimedia Tools and Applications | 2015年 / 74卷
关键词
Face detection; Tamper detection; Self-recovery; Watermarking; SPIHT; QIM;
D O I
暂无
中图分类号
学科分类号
摘要
The face regions of digital pictures are some of the principal target of tampering to generate a potential scandal, causing social and economic damages to involved persons. In this paper, we propose a face region authentication and recovery system, in which the face regions are automatically protected at the moment when the picture is taken by a digital camera. When the original face of the picture is replaced by another face by malicious person, the system can detect the tampered face and recover the original one. The proposed system consists of two stages: the face region protection stage and the face region tamper detection and recovery stage. In both stages, the face detection module based on the Viola-Jones algorithm, face region encoding/decoding modules based on the Set Partitioning in Hierarchical Trees (SPIHT) algorithm and watermarking module based on Quantization Index Modulation (QIM) are used. These three algorithms, Viola-Jones detector, SPIHT and QIM, are determined as most adequate algorithms for proposed system after several evaluations. The experimental results show a high quality of the watermarked as well as the recovered images, obtaining average Peak Signals to Noise Ratios (PSNR) of more than 40 and 38 dB, respectively.
引用
收藏
页码:7685 / 7709
页数:24
相关论文
共 57 条
  • [1] Chen M(2010)A digital image watermarking of self-recovery based on the SPIHT algorithm Int Conf Signal Process Syst 2 621-624
  • [2] Sun X(2001)Quantization Index Modulation: a class of provably good method for digital watermarking and information embedding IEEE Trans Inf Theory 47 1423-1443
  • [3] Chen B(1984)Summed-area tables for texture mapping Proc SIGGRAPH 18 207-212
  • [4] Wornell GW(2010)Semi-fragile watermarking based content image authentication scheme (Spanish) Rev Fac Ing 56 160-169
  • [5] Crow F(2000)Digital rights management and watermarking of multimedia content for m-commerce applications IEEE Commun Mag 38 78-84
  • [6] Cruz C(2007)Tutorial series en brain-inspired computing part 6: geometrical structuring of boosting algorithm N Gener Comput 25 117-141
  • [7] Reyes R(2010)Comparative analysis of various compression methods for medical images Poc ISCET 101 137-142
  • [8] Nakano M(2008)Dual watermark for image tamper detection and recovery Pattern Recogn 41 3497-3506
  • [9] Perez H(2013)Parallel blind digital image watermarking in spatial and frequency domain Telecommun Syst Model Anal Des Manag 49 187-197
  • [10] Hartung F(2012)Lightweight secure multimedia distribution based on homomorphic operations Telecommun Syst 7 6875-6888