Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator
ACM Transactions on Modeling and Computer Simulation (TOMACS) - Special issue on uniform random number generation
Perceptual Digital Watermarking for Image Authentication in Electronic Commerce
Electronic Commerce Research
A Semi-Fragile Watermark Scheme For Image Authentication
MMM '04 Proceedings of the 10th International Multimedia Modelling Conference
Semi-Fragile Watermarking Scheme for Authentication of JPEG Images
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security)
A robust content-based digital image watermarking scheme
Signal Processing
Blind watermarking applied to image authentication
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
IEEE Transactions on Multimedia
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A novel reversible image authentication scheme for digital images
Signal Processing
A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames
Journal of Visual Communication and Image Representation
Hi-index | 0.00 |
This paper presents a novel semi-fragile watermarking scheme for image content authentication with tampering localization. The proposed scheme uses a non-traditional quantization method to modify one chosen approximation coefficient of each non-overlapping block to ensure its robustness against incidental attacks and fragileness against malicious attacks. The image content authentication starts with extracting watermark using the parity of quantization results from the probe image, where the round operation is used to ensure the semi-fragile property. It then constructs a binary error map and computes two authentication measures with M"1 measuring the overall similarity between extracted and embedded watermarks and M"2 measuring the overall clustering level of tampered error pixels. These two measures are further integrated to confirm the image content and localize the possible tampered areas. Our experimental results show that our scheme outperforms four peer schemes and is capable of identifying intentional tampering and incidental modification, and localizing tampered regions.