Digital image ownership authentication via camouflaged unseen-visible watermarking

被引:13
|
作者
Ulises Juarez-Sandoval, Oswaldo [1 ]
Cedillo-Hernandez, Manuel [1 ]
Nakano-Miyatake, Mariko [1 ]
Cedillo-Hernandez, Antonio [1 ]
Perez-Meana, Hector [1 ]
机构
[1] Inst Politecn Nacl, SEPI ESIME Culhuacan, Ave Santa Ana 1000, Mexico City, DF, Mexico
关键词
Watermarking; Image-processing; Information security; Unseen-visible watermarking; Ownership authentication; ROBUST; DELIVERY;
D O I
10.1007/s11042-018-5881-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, end users can easily capture digital images using several devices, such as smartphones, mobile devices and digital imaging cameras, allowing such images to be easily copied, manipulated, transmitted or format converted without any restrictions. This fact suggests the necessity to develop digital tools, such as digital watermarking, to solve the issues associated with copyright protection and ownership authentication of digital images. To claim the ownership of a digital image, we propose a camouflaged, unseen-visible watermarking technique based on luminance and texture properties in conjunction with an image enhancement criterion. The proposed method has some advantages over invisible and visible watermarking methodologies in terms of readability and imperceptibility of the watermark, respectively. The experimental results demonstrate that the proposed scheme is effective and applicable for digital images on a variety of topics, including natural scenes and man-made objects, both indoors and outdoors. A comparison with previously reported methods based on unseen-visible watermarking techniques is also provided.
引用
收藏
页码:26601 / 26634
页数:34
相关论文
共 50 条
  • [41] A Tampering Authentication Algorithm for JPEG Image Based on Adaptive Digital Watermarking
    Liu, Guang-qi
    Zheng, Xiao-shi
    Zhao, Yan-ling
    Yang, Cheng-zhong
    Ding, Yuan-yu
    Liao, Lu-fang
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 1, 2011, : 332 - 335
  • [42] An improved semi-fragile digital watermarking scheme for image authentication
    Xie, Rongsheng
    Wu, Keshuo
    Li, Chunguang
    Zhu, Shunzhi
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 262 - +
  • [43] Least Significant Bit Hash Algorithm for Digital Image Watermarking Authentication
    Muyco, Stella D.
    Hernandez, Alexander A.
    ICCAI '19 - PROCEEDINGS OF THE 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE, 2019, : 150 - 154
  • [44] Image authentication based on digital signature and semi-fragile watermarking
    Hong-Bin Zhang
    Cheng Yang
    Xiao-Mei Quan
    Journal of Computer Science and Technology, 2004, 19 : 752 - 759
  • [45] Wavelet packets-based digital watermarking for image verification and authentication
    Paquet, AH
    Ward, RK
    Pitas, I
    SIGNAL PROCESSING, 2003, 83 (10) : 2117 - 2132
  • [46] A robust watermarking and image authentication scheme used for digital contant application
    Kung, Chih-Ming
    Chao, Shu-Tsung
    Tu, Yen-Chen
    Yan, Yu-Hua
    Kung, Chih-Hsien
    Journal of Multimedia, 2009, 4 (03): : 112 - 119
  • [47] Digital watermarking technique for image authentication by neighbouring block similarity measure
    Chotikakamthorn, N
    Sangiamkun, W
    IEEE REGION 10 INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONIC TECHNOLOGY, VOLS 1 AND 2, 2001, : 743 - 747
  • [48] Fragile watermarking scheme for digital image authentication using pixel difference
    Chang, C-C
    Lin, P-Y
    Chuang, J-C
    IMAGING SCIENCE JOURNAL, 2007, 55 (03): : 140 - 147
  • [49] A Joint Spatial Texture Analysis/Watermarking System for Digital Image Authentication
    Ghadi, Musab
    Laouamer, Lamri
    Nana, Laurent
    Pascu, Anca
    2017 IEEE INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING SYSTEMS (SIPS), 2017,
  • [50] Image authentication based on digital signature and semi-fragile watermarking
    Zhang, HB
    Yang, C
    Quan, XM
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2004, 19 (06) : 752 - 759