Digital Watermarking for Image Authentication with Localization
In this paper we propose a novel watermarking scheme for image authentication. A high localization of tampering detection is achieved by applying a random permutation process where every embedded watermark bit verifies random image positions instead of a local image block. Thereby the resolution of...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1976 |
---|---|
container_issue | |
container_start_page | 1973 |
container_title | |
container_volume | |
creator | Liu, H. Steinebach, M. |
description | In this paper we propose a novel watermarking scheme for image authentication. A high localization of tampering detection is achieved by applying a random permutation process where every embedded watermark bit verifies random image positions instead of a local image block. Thereby the resolution of tampering detection is significantly improved in comparison to existing solutions while keeping the payload low. Furthermore, the proposed scheme doesn't embed the watermark locally but distributes it into the suitable embedding wavelet coefficients, avoiding embedding in smooth regions. Therefore, the scheme is intrinsically secure to block-based local attacks and retains high fidelity of the watermarked image. Scalable sensitivity of tampering detection is also enabled in the authentication process. Experimental results demonstrate the performance and effectiveness of the scheme for image authentication. |
doi_str_mv | 10.1109/ICIP.2006.313112 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4106944</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4106944</ieee_id><sourcerecordid>4106944</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-1a38de0ce7dea650d35f8884187a147bae36ecda41d05f742ceb6949da78c1463</originalsourceid><addsrcrecordid>eNpVjktLw0AUhccXWGv3gpv8gcR7Z24yk5WU-AoEdKG4LLfJTTvaJpKMiP56i7pxdeCcj4-j1BlCggj5RVmUD4kGyBKDBlHvqVluHZImAnII-2qijcPYpZQf_NvAHKoJplrH5Bwcq5NxfAHQsNNM1OWVX_nAm-iZgwxbHl59t4rafojKLa8kmr-HtXTB1xx830UfPqyjqq95479-mlN11PJmlNlfTtXTzfVjcRdX97dlMa9ijzYNMbJxjUAtthHOUmhM2jrnCJ1lJLtkMZnUDRM2kLaWdC3LLKe8YetqpMxM1fmv14vI4m3wu6ufC0LYUWS-AZEjTgQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Digital Watermarking for Image Authentication with Localization</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Liu, H. ; Steinebach, M.</creator><creatorcontrib>Liu, H. ; Steinebach, M.</creatorcontrib><description>In this paper we propose a novel watermarking scheme for image authentication. A high localization of tampering detection is achieved by applying a random permutation process where every embedded watermark bit verifies random image positions instead of a local image block. Thereby the resolution of tampering detection is significantly improved in comparison to existing solutions while keeping the payload low. Furthermore, the proposed scheme doesn't embed the watermark locally but distributes it into the suitable embedding wavelet coefficients, avoiding embedding in smooth regions. Therefore, the scheme is intrinsically secure to block-based local attacks and retains high fidelity of the watermarked image. Scalable sensitivity of tampering detection is also enabled in the authentication process. Experimental results demonstrate the performance and effectiveness of the scheme for image authentication.</description><identifier>ISSN: 1522-4880</identifier><identifier>ISBN: 9781424404803</identifier><identifier>ISBN: 1424404800</identifier><identifier>EISSN: 2381-8549</identifier><identifier>EISBN: 9781424404810</identifier><identifier>EISBN: 1424404819</identifier><identifier>DOI: 10.1109/ICIP.2006.313112</identifier><language>eng</language><publisher>IEEE</publisher><subject>Data mining ; digital watermark ; Discrete wavelet transforms ; Forensics ; Image authentication ; Image recognition ; Information systems ; Message authentication ; Payloads ; Security ; tampering localization ; Watermarking ; Wavelet coefficients</subject><ispartof>2006 International Conference on Image Processing, 2006, p.1973-1976</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4106944$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4106944$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Liu, H.</creatorcontrib><creatorcontrib>Steinebach, M.</creatorcontrib><title>Digital Watermarking for Image Authentication with Localization</title><title>2006 International Conference on Image Processing</title><addtitle>ICIP</addtitle><description>In this paper we propose a novel watermarking scheme for image authentication. A high localization of tampering detection is achieved by applying a random permutation process where every embedded watermark bit verifies random image positions instead of a local image block. Thereby the resolution of tampering detection is significantly improved in comparison to existing solutions while keeping the payload low. Furthermore, the proposed scheme doesn't embed the watermark locally but distributes it into the suitable embedding wavelet coefficients, avoiding embedding in smooth regions. Therefore, the scheme is intrinsically secure to block-based local attacks and retains high fidelity of the watermarked image. Scalable sensitivity of tampering detection is also enabled in the authentication process. Experimental results demonstrate the performance and effectiveness of the scheme for image authentication.</description><subject>Data mining</subject><subject>digital watermark</subject><subject>Discrete wavelet transforms</subject><subject>Forensics</subject><subject>Image authentication</subject><subject>Image recognition</subject><subject>Information systems</subject><subject>Message authentication</subject><subject>Payloads</subject><subject>Security</subject><subject>tampering localization</subject><subject>Watermarking</subject><subject>Wavelet coefficients</subject><issn>1522-4880</issn><issn>2381-8549</issn><isbn>9781424404803</isbn><isbn>1424404800</isbn><isbn>9781424404810</isbn><isbn>1424404819</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVjktLw0AUhccXWGv3gpv8gcR7Z24yk5WU-AoEdKG4LLfJTTvaJpKMiP56i7pxdeCcj4-j1BlCggj5RVmUD4kGyBKDBlHvqVluHZImAnII-2qijcPYpZQf_NvAHKoJplrH5Bwcq5NxfAHQsNNM1OWVX_nAm-iZgwxbHl59t4rafojKLa8kmr-HtXTB1xx830UfPqyjqq95479-mlN11PJmlNlfTtXTzfVjcRdX97dlMa9ijzYNMbJxjUAtthHOUmhM2jrnCJ1lJLtkMZnUDRM2kLaWdC3LLKe8YetqpMxM1fmv14vI4m3wu6ufC0LYUWS-AZEjTgQ</recordid><startdate>200610</startdate><enddate>200610</enddate><creator>Liu, H.</creator><creator>Steinebach, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200610</creationdate><title>Digital Watermarking for Image Authentication with Localization</title><author>Liu, H. ; Steinebach, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-1a38de0ce7dea650d35f8884187a147bae36ecda41d05f742ceb6949da78c1463</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Data mining</topic><topic>digital watermark</topic><topic>Discrete wavelet transforms</topic><topic>Forensics</topic><topic>Image authentication</topic><topic>Image recognition</topic><topic>Information systems</topic><topic>Message authentication</topic><topic>Payloads</topic><topic>Security</topic><topic>tampering localization</topic><topic>Watermarking</topic><topic>Wavelet coefficients</topic><toplevel>online_resources</toplevel><creatorcontrib>Liu, H.</creatorcontrib><creatorcontrib>Steinebach, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Liu, H.</au><au>Steinebach, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Digital Watermarking for Image Authentication with Localization</atitle><btitle>2006 International Conference on Image Processing</btitle><stitle>ICIP</stitle><date>2006-10</date><risdate>2006</risdate><spage>1973</spage><epage>1976</epage><pages>1973-1976</pages><issn>1522-4880</issn><eissn>2381-8549</eissn><isbn>9781424404803</isbn><isbn>1424404800</isbn><eisbn>9781424404810</eisbn><eisbn>1424404819</eisbn><abstract>In this paper we propose a novel watermarking scheme for image authentication. A high localization of tampering detection is achieved by applying a random permutation process where every embedded watermark bit verifies random image positions instead of a local image block. Thereby the resolution of tampering detection is significantly improved in comparison to existing solutions while keeping the payload low. Furthermore, the proposed scheme doesn't embed the watermark locally but distributes it into the suitable embedding wavelet coefficients, avoiding embedding in smooth regions. Therefore, the scheme is intrinsically secure to block-based local attacks and retains high fidelity of the watermarked image. Scalable sensitivity of tampering detection is also enabled in the authentication process. Experimental results demonstrate the performance and effectiveness of the scheme for image authentication.</abstract><pub>IEEE</pub><doi>10.1109/ICIP.2006.313112</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1522-4880 |
ispartof | 2006 International Conference on Image Processing, 2006, p.1973-1976 |
issn | 1522-4880 2381-8549 |
language | eng |
recordid | cdi_ieee_primary_4106944 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Data mining digital watermark Discrete wavelet transforms Forensics Image authentication Image recognition Information systems Message authentication Payloads Security tampering localization Watermarking Wavelet coefficients |
title | Digital Watermarking for Image Authentication with Localization |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T04%3A29%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Digital%20Watermarking%20for%20Image%20Authentication%20with%20Localization&rft.btitle=2006%20International%20Conference%20on%20Image%20Processing&rft.au=Liu,%20H.&rft.date=2006-10&rft.spage=1973&rft.epage=1976&rft.pages=1973-1976&rft.issn=1522-4880&rft.eissn=2381-8549&rft.isbn=9781424404803&rft.isbn_list=1424404800&rft_id=info:doi/10.1109/ICIP.2006.313112&rft_dat=%3Cieee_6IE%3E4106944%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424404810&rft.eisbn_list=1424404819&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4106944&rfr_iscdi=true |