Digital image ownership authentication via camouflaged unseen-visible watermarking

被引:13
|
作者
Ulises Juarez-Sandoval, Oswaldo [1 ]
Cedillo-Hernandez, Manuel [1 ]
Nakano-Miyatake, Mariko [1 ]
Cedillo-Hernandez, Antonio [1 ]
Perez-Meana, Hector [1 ]
机构
[1] Inst Politecn Nacl, SEPI ESIME Culhuacan, Ave Santa Ana 1000, Mexico City, DF, Mexico
关键词
Watermarking; Image-processing; Information security; Unseen-visible watermarking; Ownership authentication; ROBUST; DELIVERY;
D O I
10.1007/s11042-018-5881-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, end users can easily capture digital images using several devices, such as smartphones, mobile devices and digital imaging cameras, allowing such images to be easily copied, manipulated, transmitted or format converted without any restrictions. This fact suggests the necessity to develop digital tools, such as digital watermarking, to solve the issues associated with copyright protection and ownership authentication of digital images. To claim the ownership of a digital image, we propose a camouflaged, unseen-visible watermarking technique based on luminance and texture properties in conjunction with an image enhancement criterion. The proposed method has some advantages over invisible and visible watermarking methodologies in terms of readability and imperceptibility of the watermark, respectively. The experimental results demonstrate that the proposed scheme is effective and applicable for digital images on a variety of topics, including natural scenes and man-made objects, both indoors and outdoors. A comparison with previously reported methods based on unseen-visible watermarking techniques is also provided.
引用
收藏
页码:26601 / 26634
页数:34
相关论文
共 50 条
  • [31] An image authentication scheme based on digital watermarking and image secret sharing
    Hsieh, Shang-Lin
    Tsai, I-Ju
    Yeh, Chung-Ping
    Chang, Chia-Ming
    MULTIMEDIA TOOLS AND APPLICATIONS, 2011, 52 (2-3) : 597 - 619
  • [32] An image authentication scheme based on digital watermarking and image secret sharing
    Shang-Lin Hsieh
    I-Ju Tsai
    Chung-Ping Yeh
    Chia-Ming Chang
    Multimedia Tools and Applications, 2011, 52 : 597 - 619
  • [33] A REVIEW ON METHODS FOR IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY IN DIGITAL IMAGE WATERMARKING
    Vyas, Chinmay
    Lunagaria, Munindra
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 1191 - 1196
  • [34] A digital watermarking scheme for personal image authentication using eigenface
    Chen, CH
    Chang, LW
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 3, PROCEEDINGS, 2004, 3333 : 410 - 417
  • [35] The survey of digital watermarking-based image authentication techniques
    Liu, T
    Qiu, ZD
    2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 1556 - 1559
  • [36] Digital watermarking scheme exploiting nondeterministic dependence for image authentication
    Li, Chang-Tsun
    Yuan, Yinyin
    OPTICAL ENGINEERING, 2006, 45 (12)
  • [37] Stereo image coding via digital watermarking
    Bhatnagar, Gaurav
    Kumar, Sanjeev
    Raman, Balasubramanian
    Sukavanam, Nagarajan
    JOURNAL OF ELECTRONIC IMAGING, 2009, 18 (03)
  • [38] Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents
    Huang, Chun-Hsiang
    Chuang, Shang-Chih
    Huang, Yen-Lin
    Wu, Ja-Ling
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (02) : 193 - 206
  • [39] Digital image watermarking for joint ownership verification without a trusted dealer
    Guo, HP
    Georganas, ND
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 497 - 500
  • [40] Chaos-based Fragile Watermarking Technique for Binary Image Authentication and Ownership Verification
    Hou Jianjun
    Li Zhaohong
    Song Wei
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1-2, 2008, : 665 - 669