The lifting scheme: a construction of second generation wavelets
SIAM Journal on Mathematical Analysis
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
A Fragile Watermarking Scheme for Image Authentication with Localization and Recovery
ISMSE '04 Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
Identifying Tampered Regions Using Singular Value Decomposition in Digital Image Forensics
CSSE '08 Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 03
Dual purpose FWT domain spread spectrum image watermarking in real time
Computers and Electrical Engineering
Tamper Detection and Self-Recovery of Image Based on Self-Embedding
APCIP '09 Proceedings of the 2009 Asia-Pacific Conference on Information Processing - Volume 02
M-ary QIM Data Hiding for Error Concealment of Digital Image in JPEG Pipeline
ACT '09 Proceedings of the 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies
Proceedings of the 1st international conference on Digital watermarking
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Content-partitioned structural similarity index for image quality assessment
Image Communication
Blind quality assessment system for multimedia communications using tracing watermarking
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
Writing on dirty paper (Corresp.)
IEEE Transactions on Information Theory
The JPEG2000 still image coding system: an overview
IEEE Transactions on Consumer Electronics
Improved wavelet-based watermarking through pixel-wise masking
IEEE Transactions on Image Processing
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Multipurpose image watermarking algorithm based on multistage vector quantization
IEEE Transactions on Image Processing
Quality Assessment of Deblocked Images
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This paper proposes a tamper detection and correction technique using semi-fragile data hiding that aims to achieve high perceptual quality of images at the user-end even after malicious modifications. A binary signature and an image digest are embedded by modulating integer wavelet coefficients using dither modulation based quantization index modulation. Half-toning technique is used to obtain image digest from the low-resolution version of the host image itself. Decoder extracts the binary signature from the watermarked image for tamper detection, while the extracted image digest is used to correct the tamper region. Unlike previously proposed techniques, this novel approach distinguishes malicious changes from various common image processing operations more efficiently and also correct tapered regions effectively. Experimental results show that the proposed technique provides a superior performance in terms of probability of miss and false alarm as well as in tamper correction, compared to several existing semi-fragile watermarking techniques.