Content-based watermarking in image authentication allowing remedying of tampered images

被引:12
|
作者
Yeh, F. H. [1 ]
Lee, G. C. [1 ]
机构
[1] Natl Taiwan Normal Univ, Dept Informat & Comp Educ, Taipei, Taiwan
关键词
image processing; image transmission; image reconstruction;
D O I
10.1117/1.2227367
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Fragile watermarking techniques are developed to ensure the credibility and integrity of images in open communication channels. Many related studies have proposed methods for accurately localizing tampered areas, but the ability to recover such areas has received less attention. Therefore, we propose a content-based fragile watermarking technique that can both accurately localize tampered areas and correct them in details, using embedded content-based watermarks. Our scheme provides a novel watermark structure. It adopts JPEG-compressed watermark prototypes and categorizes them into smooth, mid-textured, and textured areas. To resist forged-watermark attacks and promote self-recovery ability, the relationships among blocks are created by a toral automorphism with an asymmetric key structure. Furthermore, the watermark prototypes are disordered by a one-way hashing function and encrypted by a public-key encryption function to increase the security of watermarks. Finally, the watermarks are embedded to protect the integrity of images. Experiments show that the proposed scheme can correctly localize tampered areas and remedy them to the extent of JPEG-compression quality even when 50% of the image is cropped, and resist forged-watermark attacks. (c) 2006 Society of Photo-Optical Instrumentation Engineers.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Segmentation and Content-Based Watermarking for Color Image and Image Region Indexing and Retrieval
    Nikolaos V. Boulgouris
    Ioannis Kompatsiaris
    Vasileios Mezaris
    Dimitrios Simitopoulos
    Michael G. Strintzis
    EURASIP Journal on Advances in Signal Processing, 2002
  • [32] Content-based image authentication: Current status, issues, and challenges
    Han, Shuihua
    Chu, Chao-Hsien
    Yang, Shuangyuan
    ICSC 2007: INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING, PROCEEDINGS, 2007, : 630 - +
  • [33] Content-based image authentication: current status, issues, and challenges
    Han, Shui-Hua
    Chu, Chao-Hsien
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (01) : 19 - 32
  • [34] Content-based image authentication: current status, issues, and challenges
    Shui-Hua Han
    Chao-Hsien Chu
    International Journal of Information Security, 2010, 9 : 19 - 32
  • [35] Content-based chaotic watermarking in binary images for antiforgery of electronic bills
    Tao, Rui
    Sun, Yanjing
    Liu, Weidong
    ICIC Express Letters, Part B: Applications, 2015, 6 (12): : 3259 - 3264
  • [36] Content-based image authentication by feature point clustering and matching
    Yang, Lei
    Tian, Jun
    Wu, Dapeng
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (06) : 636 - 647
  • [37] A content-based image authentication system with lossless data hiding
    Zou, DK
    Wu, CW
    Xuan, GR
    Shi, YQ
    2003 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL II, PROCEEDINGS, 2003, : 213 - 216
  • [38] AN EFFECTIVE CONTENT-BASED COPY DETECTION SCHEME FOR IMAGE AUTHENTICATION
    Lin, Shinfeng D.
    Yang, Long-Siang Ou
    PROCEEDINGS OF 2014 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2014, : 321 - 325
  • [39] A content-based image authentication scheme based on singular value decomposition
    Lu T.-C.
    Chang C.-C.
    Liu Y.-L.
    Pattern Recognition and Image Analysis, 2006, 16 (3) : 506 - 522
  • [40] A PRIVACY-PRESERVING CONTENT-BASED IMAGE RETRIEVAL SCHEME ALLOWING MIXED USE OF ENCRYPTED AND PLAIN IMAGES
    Iide, Kenta
    Kiya, Hitoshi
    2020 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2020, : 1436 - 1441