Image authentication and recovery scheme based on watermarking technique
CEA'08 Proceedings of the 2nd WSEAS International Conference on Computer Engineering and Applications
Dual watermark for image tamper detection and recovery
Pattern Recognition
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter
ATC '08 Proceedings of the 5th international conference on Autonomic and Trusted Computing
Iterative compensation schemes for multimedia content authentication
Journal of Visual Communication and Image Representation
Recover the tampered image based on VQ indexing
Signal Processing
Compensated Signature Embedding for Multimedia Content Authentication
Journal of Data and Information Quality (JDIQ)
Image Authentication Scheme Based on Self-embedding Watermarking
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Image encryption and authentication by orthonormal transform with CRC
Proceedings of the 2011 International Conference on Communication, Computing & Security
Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images
Journal of Visual Communication and Image Representation
Tamper-proof image watermarking using self-embedding
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Dual-purpose semi-fragile watermark: Authentication and recovery of digital images
Computers and Electrical Engineering
Hi-index | 0.00 |
A fragile, block-wise, and content-based watermarking for image authentication and recovery is presented. In this scheme, the watermark of each block is an encrypted form of its signature, which includes the block location, a content-feature of another block, and a CRC checksum. While the CRC checksum is to authenticating the signature, the mixture of the location indices of one block with the feature of a randomly selected block complicates the VQ attack. The encryption further strengthens the security. That all security parameters are user dependent and can be computed at both ends individually based on Diffie-Hellman key exchange method makes the scheme not only robust against collage attack but also truly oblivious. The experiments demonstrate that our scheme can detect and localize any tampering of size 8x8 pixels and above and can recover a 40% damaged image to an intelligible one with 24dB. As for incidentally manipulated images, our scheme can invalidate all the blocks but will not further degrade the images. Comparing with the scheme of Celik et al. [14], ours has better tamper localization accuracy while trading off 2-3 dB of the PSNR of watermarked images for recovery.