TY - GEN
T1 - Image authentication scheme based on self-embedding watermarking
AU - Cruz-Ramos, Clara
AU - Reyes-Reyes, Rogelio
AU - Nakano-Miyatake, Mariko
AU - Pérez-Meana, Héctor
PY - 2009
Y1 - 2009
N2 - This paper presents a block-wise and content-based semi-fragile image watermarking authentication scheme with location and recovery capability. Firstly the image is segmented by two regions: Region of Interest (ROI) and Region of Embedding (ROE). The watermark sequence is extracted from ROI and it is embedded into the middle frequency band of DCT coefficients of ROE. In the authentication stage, two watermark sequences extracted ROI and ROE, respectively, are used. If difference between both sequences of a ROI block is smaller than the predefined threshold value, the ROI block is determined authentic, otherwise the block is considered as tampered and it is recovered by the recovery process. The proposed scheme is evaluated from several points of view: watermark imperceptibility, capability of tamper detection, image quality of recovered regions and robustness of no-intentional manipulations, such as JPEG compression. The simulation results show fairly good performance of the proposed scheme.
AB - This paper presents a block-wise and content-based semi-fragile image watermarking authentication scheme with location and recovery capability. Firstly the image is segmented by two regions: Region of Interest (ROI) and Region of Embedding (ROE). The watermark sequence is extracted from ROI and it is embedded into the middle frequency band of DCT coefficients of ROE. In the authentication stage, two watermark sequences extracted ROI and ROE, respectively, are used. If difference between both sequences of a ROI block is smaller than the predefined threshold value, the ROI block is determined authentic, otherwise the block is considered as tampered and it is recovered by the recovery process. The proposed scheme is evaluated from several points of view: watermark imperceptibility, capability of tamper detection, image quality of recovered regions and robustness of no-intentional manipulations, such as JPEG compression. The simulation results show fairly good performance of the proposed scheme.
KW - Image authentication
KW - Self-embedding watermarking
KW - Semi-fragile watermarking
KW - Tamper detection
KW - Tamper localization
UR - http://www.scopus.com/inward/record.url?scp=78650929333&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-10268-4_117
DO - 10.1007/978-3-642-10268-4_117
M3 - Contribución a la conferencia
SN - 3642102670
SN - 9783642102677
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1005
EP - 1012
BT - Progress in Pattern Recognition, Image Analysis, Computer Vision and Applications - 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009, Proceedings
T2 - 14th Iberoamerican Conference on Pattern Recognition, CIARP 2009
Y2 - 15 November 2009 through 18 November 2009
ER -