TY - GEN
T1 - Watermarking algorithm for authentication and self-recovery of tampered images using DWT
AU - Molina-Garcia, Javier
AU - Reyes-Reyes, Rogelio
AU - Ponomaryov, Volodymyr
AU - Cruz-Ramos, Clara
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/8/9
Y1 - 2016/8/9
N2 - Nowadays the use of digital images is a common practice worldwide, they are used for social, commercial or legal purposes among others; therefore it is important to detect malicious alterations in this type of content, to avoid possible social, legal or personal damages. Currently there are various proposed techniques to solve this problem. However, most of these proposals can only protect a region of interest within digital image, making feasible even with these methods, the alteration of certain regions that are not protected. Therefore, this paper proposes a digital image watermarking algorithm, which consists of two stages; the first one is to protect the digital image that is performed by Daubechies DWT, halftoning and QIM methods; the second one is used for authentication, detection and self-recovery of tampered regions, through IDWT, inverse halftoning and median filtering. Experimental results have demonstrated the effectiveness of the proposed algorithm, obtaining average PSNR values of 35 dB in the self-recovery image, even if the watermarked image was subjected to a JPEG compression using a quality factor QF=75.
AB - Nowadays the use of digital images is a common practice worldwide, they are used for social, commercial or legal purposes among others; therefore it is important to detect malicious alterations in this type of content, to avoid possible social, legal or personal damages. Currently there are various proposed techniques to solve this problem. However, most of these proposals can only protect a region of interest within digital image, making feasible even with these methods, the alteration of certain regions that are not protected. Therefore, this paper proposes a digital image watermarking algorithm, which consists of two stages; the first one is to protect the digital image that is performed by Daubechies DWT, halftoning and QIM methods; the second one is used for authentication, detection and self-recovery of tampered regions, through IDWT, inverse halftoning and median filtering. Experimental results have demonstrated the effectiveness of the proposed algorithm, obtaining average PSNR values of 35 dB in the self-recovery image, even if the watermarked image was subjected to a JPEG compression using a quality factor QF=75.
KW - DWT
KW - Digital Image Watermarking
KW - Halftoning
KW - Self-Recovery
KW - Tamper Detection
UR - http://www.scopus.com/inward/record.url?scp=84987984510&partnerID=8YFLogxK
U2 - 10.1109/MSMW.2016.7538148
DO - 10.1109/MSMW.2016.7538148
M3 - Contribución a la conferencia
AN - SCOPUS:84987984510
T3 - 9th International Kharkiv Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves, MSMW 2016
BT - 9th International Kharkiv Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves, MSMW 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 9th International Kharkiv Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves, MSMW 2016
Y2 - 20 June 2016 through 24 June 2016
ER -