A ROI-BASED SELF-EMBEDDING METHOD WITH HIGH RECOVERY CAPABILITY

被引:0
|
作者
Cai, Hongliang [1 ,2 ]
Liu, Huajian [2 ]
Steinebach, Martin [2 ]
Wang, Xiaojing [1 ]
机构
[1] Chinese Acad Sci, Chengdu Inst Comp Applicat, Beijing, Peoples R China
[2] Fraunhofer SIT, Darmstadt, Germany
关键词
watermarking; multimedia authentication; Region of Interest; fountain code; IMAGE TAMPER DETECTION; FRAGILE WATERMARKING;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
In this paper, a novel block-wise fragile image watermarking algorithm for tampering localization and recovery is proposed. The image is divided into Region of Interest (ROI) and Region of Non Interest (RONI). Considering the ROI-based self-embedding problem as a special erasure channel, fountain code is applied in our method to deal with the reference symbols loss. And to minimize quality degradation in ROI, the reference symbols for recovery are only embedded into RONI blocks. Theoretical analysis shows that the result is nearly optimal, and the experimental results demonstrate the proposed method can offer low payload and high tamper tolerance. And the quality of both the watermarked image and the reconstructed image is high.
引用
收藏
页码:1722 / 1726
页数:5
相关论文
共 50 条
  • [41] A chaos-based self-embedding secure watermarking algorithm
    He Hong-Jie
    Zhang Jia-Shu
    ACTA PHYSICA SINICA, 2007, 56 (06) : 3092 - 3100
  • [42] Nested Block Based Double Self-Embedding Fragile Image Watermarking With Super-Resolution Recovery
    Rijati, Nova
    Setiadi, De Rosal Ignatius Moses
    IEEE ACCESS, 2023, 11 : 60939 - 60949
  • [43] An approach to self-embedding document watermarking based on LZW algorithm
    Arjun, N. Santosh
    Negi, Atul
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 341 - +
  • [44] Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method
    Renklier, Ayhan
    Ozturk, Serkan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (05) : 13929 - 13951
  • [45] Image authentication and recovery: Sudoku puzzle and MD5 hash algorithm based self-embedding fragile image watermarking method
    Ayhan Renklier
    Serkan Öztürk
    Multimedia Tools and Applications, 2024, 83 : 13929 - 13951
  • [46] Performance Analysis of Fridrich-Goljan Self-Embedding Authentication Method
    Dominguez-Conde, Gabriel
    Comesana, Pedro
    Perez-Gonzalez, Fernando
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 570 - 577
  • [47] The self-embedding theorem of WKL(o) and a non-standard method
    Tanaka, K
    ANNALS OF PURE AND APPLIED LOGIC, 1997, 84 (01) : 41 - 49
  • [48] PERFOMANCE ANALYSIS OF THE FRIDRICH-GOLJAN SELF-EMBEDDING AUTHENTICATION METHOD
    Dominguez-Conde, Gabriel
    Comesana, Pedro
    Perez-Gonzalez, Fernando
    2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6, 2009, : 1253 - 1256
  • [49] A novel pixel-wise authentication-based self-embedding fragile watermarking method
    Gul, Ertugrul
    Ozturk, Serkan
    MULTIMEDIA SYSTEMS, 2021, 27 (03) : 531 - 545
  • [50] A novel pixel-wise authentication-based self-embedding fragile watermarking method
    Ertugrul Gul
    Serkan Ozturk
    Multimedia Systems, 2021, 27 : 531 - 545