Image authentication scheme based on self-embedding watermarking

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

This paper presents a block-wise and content-based semi-fragile image watermarking authentication scheme with location and recovery capability. Firstly the image is segmented by two regions: Region of Interest (ROI) and Region of Embedding (ROE). The watermark sequence is extracted from ROI and it is embedded into the middle frequency band of DCT coefficients of ROE. In the authentication stage, two watermark sequences extracted ROI and ROE, respectively, are used. If difference between both sequences of a ROI block is smaller than the predefined threshold value, the ROI block is determined authentic, otherwise the block is considered as tampered and it is recovered by the recovery process. The proposed scheme is evaluated from several points of view: watermark imperceptibility, capability of tamper detection, image quality of recovered regions and robustness of no-intentional manipulations, such as JPEG compression. The simulation results show fairly good performance of the proposed scheme.

Original languageEnglish
Title of host publicationProgress in Pattern Recognition, Image Analysis, Computer Vision and Applications - 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Proceedings
Pages1005-1012
Number of pages8
DOIs
StatePublished - 2009
Event14th Iberoamerican Conference on Pattern Recognition, CIARP 2009 - Guadalajara, Jalisco, Mexico
Duration: 15 Nov 200918 Nov 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5856 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th Iberoamerican Conference on Pattern Recognition, CIARP 2009
Country/TerritoryMexico
CityGuadalajara, Jalisco
Period15/11/0918/11/09

Keywords

  • Image authentication
  • Self-embedding watermarking
  • Semi-fragile watermarking
  • Tamper detection
  • Tamper localization

Fingerprint

Dive into the research topics of 'Image authentication scheme based on self-embedding watermarking'. Together they form a unique fingerprint.

Cite this