Image authentication with tampering localization based on watermark embedding in wavelet domain

被引:11
作者
Chang, Hsuan T. [3 ]
Hsu, Chih-Chung [2 ]
Yeh, Chia-Hung [1 ]
Shen, Day-Fann [3 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Elect Engn, Ctr Wireless Multimedia Commun, Kaohsiung 804, Taiwan
[2] Natl Tsing Hua Univ, Dept Elect Engn, Hsinchu 300, Taiwan
[3] Natl Yunlin Univ Sci & Technol, Dept Elect Engn, Douliu Yunlin 640, Taiwan
关键词
image authentication; tampering localization; digital watermarking; morphology; DIGITAL WATERMARKING; ROBUST;
D O I
10.1117/1.3127192
中图分类号
O43 [光学];
学科分类号
070207 [光学];
摘要
An image authentication and tampering localization technique based on a wavelet-based digital watermarking procedure [Opt. Express 3 (12), 491-496 (1998)] is proposed. To determine whether a given watermarked image has been tampered with or not, the similarity between the extracted and embedded watermarks is measured. If the similarity is less than a threshold value, the proposed sequential watermark alignment based on a coefficient stamping (SWACS) scheme is used to determine the modified wavelet coefficients corresponding to the tampered region. Then, the morphological region growing and subband duplication (MRGSD) scheme are used to include neighboring wavelet coefficients and then duplicate the wavelet coefficients in other subbands. The experimental results show that the proposed SWACS and MRGSD schemes can efficiently identify different types of image tampering. Moreover, the detection performance of the proposed system on various sizes of the watermark and tampered region is also evaluated. c 2009 Society of Photo-Optical Instrumentation Engineers. [DOI: 10.1117/1.3127192]
引用
收藏
页数:10
相关论文
共 21 条
[1]
Image coding using wavelet transform [J].
Antonini, Marc ;
Barlaud, Michel ;
Mathieu, Pierre ;
Daubechies, Ingrid .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1992, 1 (02) :205-220
[2]
Image authentication techniques for surveillance applications [J].
Bartolini, F ;
Tefas, A ;
Barni, M ;
Pitas, I .
PROCEEDINGS OF THE IEEE, 2001, 89 (10) :1403-1418
[3]
Hidden messages in heavy-tails: DCT-domain watermark detection using alpha-stable models [J].
Briassouli, A ;
Tsakalides, P ;
Stouraitis, A .
IEEE TRANSACTIONS ON MULTIMEDIA, 2005, 7 (04) :700-715
[4]
Lossless watermarking for image authentication: A new framework and an implementation [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15 (04) :1042-1049
[5]
Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[6]
Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68
[7]
Image fragile watermarking based on fusion of multi-resolution tamper detection [J].
Hu, JQ ;
Huang, JW ;
Huang, DR ;
Shi, YQ .
ELECTRONICS LETTERS, 2002, 38 (24) :1512-1513
[8]
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression [J].
Kang, XG ;
Huang, JW ;
Shi, YQ ;
Lin, Y .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) :776-786
[9]
Spread-spectrum watermarking of audio signals [J].
Kirovski, D ;
Malvar, HS .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (04) :1020-1033
[10]
Image tamper detection and classification using support vector machines [J].
Knowles, HD ;
Winne, DA ;
Canagarajah, CN ;
Bull, DR .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2004, 151 (04) :322-328