A watermarking-based image ownership and tampering authentication scheme

被引:101
作者
Chang, CC
Hu, YS
Lu, TC
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
关键词
image authentication; watermarking; ownership protection; tampering detection;
D O I
10.1016/j.patrec.2005.09.006
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malicious manipulation over embedded images. In the scheme, the authentication data of an image will be inserted into adaptive least significant bits of the embedded pixels. And the number of the least significant bits will be determined according to the type of the corresponding block. The experimental results show that the quality of the embedded image is very high, and the positions of the tampered parts are located correctly. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:439 / 446
页数:8
相关论文
共 18 条
[1]   Toward secure public-key blockwise fragile authentication watermarking [J].
Barreto, PSLM ;
Kim, HY ;
Rijmen, V .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02) :57-62
[2]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[3]   A data-hiding technique with authentication, integration, and confidentiality for electronic patient records [J].
Chao, HM ;
Hsu, CM ;
Miaou, SG .
IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2002, 6 (01) :46-53
[4]  
Eggers JJ, 2001, INT CONF ACOUST SPEE, P1977, DOI 10.1109/ICASSP.2001.941335
[5]   Applying projection and B-spline to image authentication and remedy [J].
Lin, CH ;
Hsieh, WS .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2003, 49 (04) :1234-1239
[6]   A robust image authentication method distinguishing JPEG compression from malicious manipulation [J].
Lin, CY ;
Chang, SF .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) :153-168
[7]   Structural digital signature for image authentication: An incidental distortion resistant scheme [J].
Lu, CS ;
Liao, HYM .
IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (02) :161-173
[8]   Lossless compression and information hiding in images [J].
Maniccam, SS ;
Bourbakis, N .
PATTERN RECOGNITION, 2004, 37 (03) :475-486
[9]   Lossless image compression and encryption using SCAN [J].
Maniccam, SS ;
Bourbakis, NG .
PATTERN RECOGNITION, 2001, 34 (06) :1229-1245
[10]   Authentication of digital images and video: Generic models and a new contribution [J].
Queluz, MP .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2001, 16 (05) :461-475