Oblivious Image Watermarking Technique for Tamper Detection
نویسنده
چکیده
In this paper I propose an oblivious watermarking technique for tamper detection in digital images. With comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from non-malicious changes resulting from common image processing operations. This technique can be implemented with small memory and computational requirements, which makes it potentially useful for hardware implementation in digital cameras. This technique works by dividing an image into blocks and watermarking each block with a transparent, robust watermark that sensitively depends on a secret key (camera’s ID) and continuously on the image. The watermarking method is a frequency based spread spectrum technique. To achieve a continuous dependency on the image, I am here with proposing a special bit extraction procedure that extracts bits from each block by thresholding projections onto key-dependent random smooth patterns. Those bits are then used for initializing a PRNG and synthesizing the spread spectrum signal.
منابع مشابه
Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملImage Watermarking for Tamper Detection
We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from nonmalicious changes resulting from common image processing operations. The technique can be implemented with small memory and computational...
متن کاملA Blind Watermarking Scheme for Tamper Detection in Digital Images
The paper proposes a method for tamper proofing digital images using the technique of digital watermarking. Many a times the published images are subject to tampering to an extent that the facts conveyed in the original image are distorted. The mechanism presented here describes a method for detecting the regions in image that were subject to illegal modifications. The method also can detect th...
متن کاملOblivious Digital Watermarking Scheme with Blob-Oriented and Modular-Arithmetic-Based Spatial-Domain Mechanism
An oblivious and robust digital watermarking scheme with a blob-oriented and modular-arithmetic-based spatial-domain mechanism is presented. It is oblivious in the sense that no original image is required for watermark extraction. By a bloboriented and modular-arithmetic-based embedding–extracting mechanism, which slightly and unevenly perturbs the intensities of the pixels within a blob throug...
متن کاملReversible Medical Image Watermarking For Tamper Detection And Recovery With Run Length Encoding Compression
Digital watermarking in medical images can ensure the authenticity and integrity of the image. This design paper reviews some existing watermarking schemes and proposes a reversible tamper detection and recovery watermarking scheme. Watermark data from ROI (Region Of Interest) are stored in RONI (Region Of Non Interest). The embedded watermark allows tampering detection and tampered image recov...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012