TY - GEN
T1 - Halftoning-based self-embedding watermarking for image authentication and recovery
AU - Mendoza-Noriega, Jose Antonio
AU - Kurkoski, Brian M.
AU - Nakano-Miyatake, Mariko
AU - Perez-Meana, Hector
PY - 2010
Y1 - 2010
N2 - This paper presents a block-wise semi-fragile watermarking algorithm for image content authentication, with tamper region localization and recovery capability. A halftone image is generated by the error diffusion halftoning method and embedded using the Quantization Index Modulation (QIM) method in the Discrete Cosine Transform (DCT) domain of the original image. The proposed method is robust to JPEG compression, because the halftone image is embedded as a watermark sequence in the middle frequencies of the DCT coefficients using QIM. Also to improve the recovered image quality, Multilayer Perceptron neural network (MLP) is used in inverse halftoning process. Data in the tampered region is estimated with gray-scale data obtained from the MLP, using the embedded halftone as input. The experimental results show desirable performance of the proposed algorithm, such as watermark imperceptibility, robustness to JPEG compression, detection accuracy of tampered region and high quality of recovered image.
AB - This paper presents a block-wise semi-fragile watermarking algorithm for image content authentication, with tamper region localization and recovery capability. A halftone image is generated by the error diffusion halftoning method and embedded using the Quantization Index Modulation (QIM) method in the Discrete Cosine Transform (DCT) domain of the original image. The proposed method is robust to JPEG compression, because the halftone image is embedded as a watermark sequence in the middle frequencies of the DCT coefficients using QIM. Also to improve the recovered image quality, Multilayer Perceptron neural network (MLP) is used in inverse halftoning process. Data in the tampered region is estimated with gray-scale data obtained from the MLP, using the embedded halftone as input. The experimental results show desirable performance of the proposed algorithm, such as watermark imperceptibility, robustness to JPEG compression, detection accuracy of tampered region and high quality of recovered image.
UR - http://www.scopus.com/inward/record.url?scp=77956589841&partnerID=8YFLogxK
U2 - 10.1109/MWSCAS.2010.5548902
DO - 10.1109/MWSCAS.2010.5548902
M3 - Contribución a la conferencia
AN - SCOPUS:77956589841
SN - 9781424477715
T3 - Midwest Symposium on Circuits and Systems
SP - 612
EP - 615
BT - 2010 IEEE International 53rd Midwest Symposium on Circuits and Systems, MWSCAS 2010
T2 - 53rd IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2010
Y2 - 1 August 2010 through 4 August 2010
ER -