Digital watermarking for image content authentication

نویسنده

  • Huajian Liu
چکیده

ii tampering detection is enabled in the authentication process by presetting the noise filter size. Second, we study the unique characteristics of synthetic images and develop a novel watermarking scheme for synthetic image authentication. The proposed watermarking algorithm is fully compatible with the characteristics of synthetic images. With less pixels modified, the authentication system can still achieve pixel-wise tamper localization resolution. Moreover, we propose a new embedding strategy, which enables the capability of recovering the altered image content of the authentication system. Hence, not only can the authenticator localize the tampered area but also it is able to recover the removed content and identify the forged parts. In addition, in order to tackle the high image fidelity requirement in some special applications, we propose a framework for ROI-supporting watermarking systems, which can be applied to different watermark embedding schemes. Based on the framework, we present the non-ubiquitous watermarking schemes with ROI masking for natural images and synthetic images respectively. Unlike the common holistic watermarking schemes, the ROI-based schemes do not embed the watermark ubiquitously over the whole image but avoiding modifying the content of the specified important regions. Although there is no watermark embedded inside these regions, their integrity is still well protected as well as other image parts. The same tamper detection resolution is achieved both inside and outside the specified ROI regions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Image Watermarking Method Based on Mean-Removed Vector Quantization for Multiple Purposes

Digital watermarking technique has been presented to solve copyright protection, copy protection, and content authentication issues in the digital world. Conventional watermarking algorithms are mostly designed for only one purpose. In recent years, some multipurpose digital watermarking methods based on discrete wavelet transform (DWT) and discrete Fourier transform (DFT) have been presented t...

متن کامل

A Study on Watermarking Schemes for Image Authentication

The digital revolution in digital image processing has made it possible to create, manipulate and transmit digital images in a simple and fast manner. The adverse affect of this is that the same image processing techniques can be used by hackers to tamper with any image and use it illegally. This has made digital image safety and integrity the top prioritized issue in today’s information explos...

متن کامل

Wavelet-based reversible watermarking for authentication

In the digital information age, digital content (audio, image, and video) can be easily copied, manipulated, and distributed. Copyright protection and content authentication of digital content has become an urgent problem to content owners and distributors. Digital watermarking has provided a valuable solution to this problem. Based on its application scenario, most digital watermarking methods...

متن کامل

Performance Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking

Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content authentication, it allows to embed relevant information with the image, which provides confidentiality, integrity and authentication by embedding Digital Signature (DS) with the Medical image. In this paper we focus on need for...

متن کامل

Watermarking-Based Digital Audio Data Authentication

Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate ...

متن کامل

Digital Image Protection using Keyed Hash Function

Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008