A Semi-Fragile Watermark Scheme For Image Authentication
MMM '04 Proceedings of the 10th International Multimedia Modelling Conference
Semi-Fragile Watermarking Scheme for Authentication of JPEG Images
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Image Authentication Using Relation Measures of Wavelet Coefficients
EEE '04 Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Technical Communication: Authentication and recovery of images using multiple watermarks
Computers and Electrical Engineering
Information Sciences: an International Journal
Dual-purpose semi-fragile watermark: Authentication and recovery of digital images
Computers and Electrical Engineering
Hi-index | 0.00 |
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against tampering. The watermark image for authentication is reconstructed by taking a weighted vote on the extracted bits. The bits that lose the vote are treated as having been tampered with, and the locations of the lost bits as indicating tampered positions. Thus, authentication and tamper-proofing can be done by observing the images of watermarks that win and lose votes. Sieving, emphasis, and weighted vote were found to be effectively make the authentication and tamper detection more accurate. The proposed scheme is robust against JPEG compression or acceptable modifications, but sensitive to malicious attacks such as cutting and pasting.