On Image Analysis by the Methods of Moments
IEEE Transactions on Pattern Analysis and Machine Intelligence
Invariant Image Recognition by Zernike Moments
IEEE Transactions on Pattern Analysis and Machine Intelligence
A Multibit Geometrically Robust Image Watermark Based on Zernike Moments
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
Content-based authentication algorithm for binary images
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Image authentication and tamper detection using two complementary watermarks
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Analysis and design of secure watermark-based authentication systems
IEEE Transactions on Information Forensics and Security
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Multimedia
Joint wavelet and spatial transformation for digital watermarking
IEEE Transactions on Consumer Electronics
Multipurpose image watermarking algorithm based on multistage vector quantization
IEEE Transactions on Image Processing
Invariant image watermark using Zernike moments
IEEE Transactions on Circuits and Systems for Video Technology
Image adaptive watermarking using wavelet domain singular value decomposition
IEEE Transactions on Circuits and Systems for Video Technology
Performance evaluation of moment-based watermarking methods: A review
Journal of Systems and Software
Hi-index | 0.00 |
We propose a content-based semi-fragile watermarking algorithm for image authentication. In content-based watermarking scheme for authentication, one of the most challenging issues is to define a computable feature vector that can capture the major content characteristics. We identify Zernike moments of the image to generate feature vector and demonstrate its good robustness and discriminative capability for authentication. The watermark is generated by quantizing Zernikemoments magnitudes (ZMMs) of the image and embedded into DWT (Discrete Wavelet Transform) subband. It is usually hard to locate the tampered area by using global feature in the content-based watermarking scheme. We propose a structural embedding method to locate the tampered areas by using the separability of Zernike moments-based feature vector. The authentication process does not need the original feature vector. By using the semi-fragilities of the feature vector and the watermark, the proposed authentication scheme is robust to content-preserved processing, while being fragile to malicious attacks. As an application of our algorithm, we apply it on Chinese digital seals and the results show that it works well. Compared with some existing algorithms, the proposed scheme achieves better performance in discriminating high-quality JPEG compression from malicious attacks.