Digital Image Processing (3rd Edition)
Digital Image Processing (3rd Edition)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01
Dual watermark for image tamper detection and recovery
Pattern Recognition
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Self Embedding Watermarking Scheme Using Halftone Image
IEICE - Transactions on Information and Systems
Technical Communication: Authentication and recovery of images using multiple watermarks
Computers and Electrical Engineering
Information Sciences: an International Journal
A quantization-based semi-fragile watermarking scheme for image content authentication
Journal of Visual Communication and Image Representation
Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images
Journal of Visual Communication and Image Representation
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Multimedia
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
In this paper two watermarking algorithms for image content authentication with localization and recovery capability of the tampered regions are proposed. In both algorithms, a halftone version of the original gray-scale image is used as an approximated version of the host image (image digest) which is then embedded as a watermark sequence into given transform domains of the host image. In the first algorithm, the Integer Wavelet Transform (IWT) is used for watermark embedding which is denominated WIA-IWT (Watermarking-based Image Authentication using IWT), while in the second one, the Discrete Cosine Transform (DCT) domain is used for this purpose, we call this algorithm WIA-DCT (Watermarking-based Image Authentication using DCT). In the authentication stage the tampered regions are detected using the Structural Similarity index (SSIM) criterion, which are then recovered using the extracted halftone image. In the recovery stage, a Multilayer Perceptron (MLP) neural network is used to carry out an inverse halftoning process to improve the recovered image quality. The experimental results demonstrate the robustness of both algorithms against content preserved modifications, such as JPEG compression, as well as an effective authentication and recovery capability. Also the proposed algorithms are compared with some previously proposed content authentication algorithms with recovery capability to show the better performance of the proposed algorithms.