PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Image authentication is an important research topic of maintaining the integrity of digital image contents. Fragile image authentication is the technique for achieving the goal of image content integrity maintenance. This article presents a fragile image authentication scheme based on the concept of wet paper codes. The proposed scheme modifies dry pixels on an image to conceal an image signature. The proposed authentication scheme can exactly detect the tampered area on a tampered image. For saving computation cost of signature embedding, an exclusive-or operation is used in the proposed authentication scheme. The experimental results show that the proposedmethod not only has good visual quality of an authorized image but also successfully detects tampered areas on a tampered image.
Wydawca
Rocznik
Strony
17--26
Opis fizyczny
bibliogr. 18 poz., fot.
Twórcy
autor
autor
  • Department of Information Engineering and Computer Science Feng Chia University No. 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan, R.O.C., ccc@cs.ccu.edu.tw
Bibliografia
  • [1] Celik, M. U., Sharma, G., Saber, E., Tekalp, A. M.: Hierarchical Watermarking for Secure Image Authentication with Localization, IEEE Transactions on Image Processing, 11(6), June 2002, 585-595.
  • [2] Chang, C.-C., Chan, C.-S.: A Watermarking Scheme Based on Principal Component Analysis Technique, Informaticas, 14(4), December 2003, 431-444.
  • [3] Chang, C.-C., Lin, P.-Y.: A Color Image AuthenticationMethod Using Partitioned Palette andMorphological Operations, IEICE Transactions on Information and Systems, E91-D(1), January 2008, 54-61.
  • [4] Chang, C.-C., Lin, P.-Y., Chuang, J.-C.: Fragile Watermarking Scheme for Digital Image Authentication Using Pixel Difference, The Imaging Science Journal, 55(3).
  • [5] Chang, C.-C., Wu, W.-C., Hu, Y.-C.: Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction, Informatica, 28(2), July 2004, 147-152.
  • [6] Fridrich, J., Goljan, M., Lisonek, P., Soukal, D.: Writing on Wet Paper, IEEE Transactions on Signal Processing, 53(10), October 2005, 3923-3935.
  • [7] Fridrich, J., Goljan, M., Soukal, D.: Perturbed Quantization Steganography, Multimedia Systems, 11(2), December 2005, 98-107.
  • [8] Fridrich, J., Goljan, M., Soukal, D.: Wet Paper Codes with Improved Embedding Efficiency, IEEE Transactions on Information Forensics and Security, 1(1), March 2006, 102-110.
  • [9] Kim, Y. W., Oh, I. S.: Watermarking Text Document Images Using Edge Direction Histograms, Pattern Recognition Letters, 25(11), August 2004, 1243-1251.
  • [10] Lin, C. Y., Chang, S. F.: A Robust Image Authentication Method Distinguishing JPEG Compression from MaliciousManipulation, IEEE Transactions on Circuits and Systems for Video Technology, 11(02), February 2001, 153-168.
  • [11] Lin, P. L., Hsieh, C. K., Huang, P. W.: A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery, Pattern Recognition, 38(12), December 2005, 2519-2529.
  • [12] Lu, C. S., Liao, H. Y. M.: Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme, IEEE Transactions on Multimedia, 5(2), June 2003, 161-173.
  • [13] Lu, T. C., Chang, C. C., Liu, Y. L.: A Content-based Image Authentication Scheme Based on Singular Value Decomposition, Pattern Recognition and Image Analysis: Advances in Mathematical Theory and Applications, 16(3), July 2006, 506-522.
  • [14] Shih, F. Y.,Wu, S. Y. T.: Combinational ImageWatermarking in the Spatial and Frequency Domains, Pattern Recognition, 36(4), April 2003, 969-975.
  • [15] Tsai, P. Y., Hu, Y. C., Chang, C. C.: Using Set Partitioning in Hierarchical Trees to Authenticate Digital Image, Signal Processing: Image Communication Journal, 18(9), October 2003, 813-822.
  • [16] Tsai, P. Y., Hu, Y. C., Chang, C. C.: A Color Image Watermarking Scheme Based on Color Quantization, Pattern Recognition, 84(4), January 2004, 95-106.
  • [17] Wong, P. W., Memon, N.: Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification, IEEE Transactions on Image Processing, 10(10), October 2001, 1593-1601.
  • [18] Wu, Y. T., Shih, F. Y.: An Adjusted-Purpose Digital Watermarking Technique, Pattern Recognition, 37(12), December 2004, 2349-2359.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS8-0004-0002
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.