QIM DATA HIDING FOR TAMPER DETECTION AND CORRECTION IN DIGITAL IMAGES USING WAVELET TRANSFORM

被引:0
|
作者
Phadikar, Amit [1 ]
Maity, Santi P. [2 ]
Mandal, Mrinal [3 ]
机构
[1] MCKV Inst Engn, Dept Informat Technol, Liluah 711204, WB, India
[2] Bengal Engn & Sci Univ, Dept Informat Technol, Sibpur 711103, India
[3] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB, Canada
关键词
QIM; Data Hiding; Tamper Detection; Tamper Correction; Wavelet transform; Lifting; WATERMARKING;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper proposes a tamper detection and correction scheme using semi-fragile data hiding that aims to achieve high perceptual quality of images at the end-user even after malicious modification. The objective is achieved by embedding an external binary signature as well a low-resolution version of the image (image digest) by modulating integer wavelet coefficients using quantization index modulation (QIM). Half-toning technique is used to obtain image digest from the low-resolution version of the image. The receiver extracts the binary signature from the watermarked image for tamper detection while the extracted image digest is used to correct the tampered region. Unlike previously proposed techniques, this novel approach distinguishes malicious changes from various common image processing operations more efficiently and also correct tapered regions effectively. We compare the performance of the proposed method in term of probability of miss and false alarm with the same for the some of the existing semi-fragile watermarking techniques to demonstrate the success and potential of the present one.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Data hiding in images in discrete wavelet domain using PMM
    Bhattacharyya, Souvik
    Sanyal, Gautam
    World Academy of Science, Engineering and Technology, 2010, 68 : 597 - 605
  • [32] Steganographic Techniques of Data Hiding using Digital Images
    Saha, Babloo
    Sharma, Shuchi
    DEFENCE SCIENCE JOURNAL, 2012, 62 (01) : 11 - 18
  • [33] Reversible data hiding using integer wavelet transform and companding technique
    Xuan, GR
    Yang, CY
    Zhen, YZ
    Shi, YQ
    Ni, ZC
    DIGITAL WATERMARKING, 2005, 3304 : 115 - 124
  • [34] Tamper detection technique for document images using zero watermarking in wavelet domain
    Singh, Balkar
    Sharma, M. K.
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 89
  • [35] A Logarithmic Quantization Index Modulation Data Hiding Using the Wavelet Transform
    Liu, Jinhua
    Ye, Peng
    2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1181 - 1184
  • [36] Edge Detection in Noisy Images Using Wavelet Transform
    Vikas, P.
    Sri Lakshmi, M.
    Rajkumar, M. Sampath
    Prasad, P. M. K.
    2015 NATIONAL CONFERENCE ON RECENT ADVANCES IN ELECTRONICS & COMPUTER ENGINEERING (RAECE), 2015, : 36 - 39
  • [37] Data Hiding in Encrypted Images Using Transpose Based Reserving Room before Encryption & Discrete Wavelet Transform
    Borse, Smita
    Jadhav, B. D.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 38 - 42
  • [38] Nonparametric steganalysis of QIM data hiding using approximate entropy
    Malik, Hafiz
    Subbalakshmi, K. P.
    Chandramouli, R.
    SECURITY, FORENSICS, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS X, 2008, 6819
  • [39] Digital watermarking methods of still images using the wavelet transform
    Thitimajshima, P
    WAVELET AND INDEPENDENT COMPONENET ANALYSIS APPLICATIONS IX, 2002, 4738 : 110 - 114
  • [40] Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique
    Jeffery H. K. Wu
    Ruey-Feng Chang
    Chii-Jen Chen
    Ching-Lin Wang
    Ta-Hsun Kuo
    Woo Kyung Moon
    Dar-Ren Chen
    Journal of Digital Imaging, 2008, 21 : 59 - 76