Fragile watermarking scheme for accepting image compression

被引:0
|
作者
Kim, MA [1 ]
Yoo, KS [1 ]
Lee, WH [1 ]
机构
[1] Chung Ang Univ, Dept Image Engn, Grad Sch Adv Imaging Sci, Art Ctr, Seoul 156756, South Korea
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As images are commonly transmitted or stored in compressed form such as JPEG lossy compression, image authentication demands techniques that can distinguish incidental modifications (e.g., compression) from malicious ones. In this paper, we propose an effective technique for image authentication which can prevent malicious manipulations but allow JPEG compression. An image is divided into blocks in the spatial domain, each block is divided into two parts by randomly selecting pixels, and average gray values for the parts are calculated. The average value is compared with that of the adjoining block to obtain an authentication signature. The extracted authentication information becomes the fragile watermark to be inserted into the image's frequency domain DCT block. The experimental results show that this is an effective technique of image authentication.
引用
收藏
页码:940 / 946
页数:7
相关论文
共 50 条
  • [1] A fragile watermarking scheme for medical image
    Wang Gang
    Rao Ni-Ni
    2005 27TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-7, 2005, : 3406 - 3409
  • [2] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900
  • [3] Fragile Watermarking Scheme for Image Authentication
    Betancourth, Gerardo Pineda
    2012 5TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTIONS (HSI 2012), 2012, : 168 - 174
  • [4] Security of fragile watermarking scheme for image authentication
    Liao, K-C
    Lee, W-B
    Liao, C-W
    IMAGING SCIENCE JOURNAL, 2006, 54 (03): : 129 - 133
  • [5] Oblivious fragile watermarking scheme for image authentication
    Li, CT
    Yang, FM
    Lee, CS
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3445 - 3448
  • [6] On the security of a fragile digital image watermarking scheme
    Sang, Jun
    Alam, Mohammad S.
    Zhu, Xiaohong
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON GRAPHICS AND VISUALIZATION IN ENGINEERING, 2007, : 53 - +
  • [7] A Fragile Watermarking Scheme for Color Image Authentication
    Hassan, M. Hamad
    Gilani, S. A. M.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 312 - 316
  • [8] A secure fragile watermarking scheme for image authentication
    He, Hongjie
    Zhang, Jiashu
    Tai, Heng-Ming
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1180 - 1185
  • [9] HIERARCHICAL FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Lin, Shinfeng D.
    Yang, Zong-Lin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 245 - 255
  • [10] A fragile watermarking scheme for tamper detection and recovery of image
    Zhu, Haifeng
    Chao, Chunhui
    Tang, Chunming
    WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 475 - 475