A robust watermarking and image authentication scheme used for digital contant application

被引:0
|
作者
Kung, Chih-Ming [1 ]
Chao, Shu-Tsung [2 ]
Tu, Yen-Chen [2 ]
Yan, Yu-Hua [3 ]
Kung, Chih-Hsien [2 ]
机构
[1] Shin-Chien University, Kaohsiung, Taiwan
[2] Chang-Jung Christian University, Tainan, Taiwan
[3] Tainan Municipal Hospital, Tainan, Taiwan
来源
Journal of Multimedia | 2009年 / 4卷 / 03期
关键词
Chromium alloys - Frequency domain analysis - Laws and legislation - Image compression - Watermarking - Intellectual property - Ternary alloys;
D O I
10.4304/jmm.4.3.112-119
中图分类号
学科分类号
摘要
The development of computers and Internet has exploded in the last few years. The digital images are distributed and duplicated easily through WWW, thus the protection of the intellectual property rights of digital images becomes an important issue. In this paper, we proposed two techniques that are robust watermarking and image authentication scheme. The proposed scheme includes two parts. The first is a robust watermarking scheme performed in the frequency domain. It can be used to prove the ownership. The second is a signature process, which can be used to prove the integrity of the image. The input of the signature process is the edge properties extracted from the image. The signature can be correctly verified when the image is incidentally damaged such as lossy compression. Such a scheme can provide a high degree of robustness against JPEG compression attacks. Experimental results are also presented to demonstrate the validity and robustness of the new approach. © 2009 ACADEMY PUBLISHER.
引用
收藏
页码:112 / 119
相关论文
共 50 条
  • [31] A Fragile Watermarking Scheme for Color Image Authentication
    Hassan, M. Hamad
    Gilani, S. A. M.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 312 - 316
  • [32] HIERARCHICAL FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Lin, Shinfeng D.
    Yang, Zong-Lin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 245 - 255
  • [33] A blind watermarking scheme for binary image authentication
    Saryazdi, S.
    Nezamabadi-Pour, H.
    Hakimi, A.
    Iranian Journal of Electrical and Computer Engineering, 2009, 8 (02): : 105 - 111
  • [34] Associative Watermarking Scheme for Medical Image Authentication
    Ghali, Neveen I.
    El Bakrawy, Lamiaa M.
    Hassanien, Aboul Ella
    INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 2011, 91 : 43 - +
  • [35] A secure fragile watermarking scheme for image authentication
    He, Hongjie
    Zhang, Jiashu
    Tai, Heng-Ming
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1180 - 1185
  • [36] Hierarchical watermarking scheme for image authentication and recovery
    Lin, PL
    Hsieh, CK
    Huang, PW
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 963 - 966
  • [37] A robust watermarking technique for biometric image authentication
    Radouane, Mohamed
    Zouggari, Nadia Idrissi
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2023, 15 (05) : 587 - 605
  • [38] New Robust Watermarking Approach for Image Authentication
    Singh, Bharat
    Sharma, Kapil Dev
    Jatav, Lal Singh
    2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2014, : 285 - 288
  • [39] Digital Image Authentication System Based on Digital Watermarking
    Bhargava, Neeraj
    Sharma, M. M.
    Garhwal, Abhimanyu Singh
    Mathuria, Manish
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 185 - 189
  • [40] A Robust Watermarking Scheme for City Image
    Jin, Ruichen
    Kim, Jongweon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 303 - 314