A reversible watermarking for image content authentication based on wavelet transform
In the special field of anti-counterfeit authentication, such as medical archive protection, there is a problem of copyright infringement. To protect the privacy contents and achieve lossless recovery, we propose a reversible watermarking technology. In order to solve the problem, a wavelet transfor...
Gespeichert in:
Veröffentlicht in: | Signal, image and video processing image and video processing, 2024-04, Vol.18 (3), p.2799-2809 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2809 |
---|---|
container_issue | 3 |
container_start_page | 2799 |
container_title | Signal, image and video processing |
container_volume | 18 |
creator | Li, De Dai, Xianlong Gui, Jiang Liu, Jinyan Jin, Xun |
description | In the special field of anti-counterfeit authentication, such as medical archive protection, there is a problem of copyright infringement. To protect the privacy contents and achieve lossless recovery, we propose a reversible watermarking technology. In order to solve the problem, a wavelet transform-based reversible watermarking algorithm is proposed for image content authentication. To avoid the influence of tampering on the wavelet domain of the whole image, each block is transformed by wavelet transform as the carrier signal for carrying the watermark information. In the aspect of security, two watermarks are encrypted and scrambled by chaotic mapping with different keys, which increases the security of the watermark and the randomness of embedding. In tamper detection, different levels of detection and screening are used to improve the accuracy. When restoring the tampered area, two watermarks are used to reconstruct the category and feature information of the image block. Experimental results show that, after general tampering, constant mean tampering and paste tampering, the proposed watermarking algorithm can accurately detect and locate tampered areas and can restore the approximate original image information with high quality. |
doi_str_mv | 10.1007/s11760-023-02950-z |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2968914648</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2968914648</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-f03303556131188c85e01b0735672136065c375ff5be9f4db444ad0887dfe8d83</originalsourceid><addsrcrecordid>eNp9UMtOwzAQtBBIVKU_wMkS54A3jh85VhUvqRIXeracZF1S2qTYbiv69bgEwY2VVjOHmVntEHIN7BYYU3cBQEmWsZynLQXLjmdkBFryDBTA-S9n_JJMQlixNDxXWuoRWUypxz360FZrpAcb0W-sf2-7JXW9p-3GLpHWfRexi9Tu4lvCtrax7Tta2YANTeRg97jGSKO3XUi2zRW5cHYdcPKDY7J4uH-dPWXzl8fn2XSe1RzKmDnGOeNCSOAAWtdaIIOKKS6kyoFLJkXNlXBOVFi6oqmKorAN01o1DnWj-ZjcDLlb33_sMESz6ne-SydNXkpdQiGLkyofVLXvQ_DozNanx_ynAWZODZqhQZMaNN8NmmMy8cEUkrhbov-L_sf1BQrOc-A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2968914648</pqid></control><display><type>article</type><title>A reversible watermarking for image content authentication based on wavelet transform</title><source>Springer Nature - Complete Springer Journals</source><creator>Li, De ; Dai, Xianlong ; Gui, Jiang ; Liu, Jinyan ; Jin, Xun</creator><creatorcontrib>Li, De ; Dai, Xianlong ; Gui, Jiang ; Liu, Jinyan ; Jin, Xun</creatorcontrib><description>In the special field of anti-counterfeit authentication, such as medical archive protection, there is a problem of copyright infringement. To protect the privacy contents and achieve lossless recovery, we propose a reversible watermarking technology. In order to solve the problem, a wavelet transform-based reversible watermarking algorithm is proposed for image content authentication. To avoid the influence of tampering on the wavelet domain of the whole image, each block is transformed by wavelet transform as the carrier signal for carrying the watermark information. In the aspect of security, two watermarks are encrypted and scrambled by chaotic mapping with different keys, which increases the security of the watermark and the randomness of embedding. In tamper detection, different levels of detection and screening are used to improve the accuracy. When restoring the tampered area, two watermarks are used to reconstruct the category and feature information of the image block. Experimental results show that, after general tampering, constant mean tampering and paste tampering, the proposed watermarking algorithm can accurately detect and locate tampered areas and can restore the approximate original image information with high quality.</description><identifier>ISSN: 1863-1703</identifier><identifier>EISSN: 1863-1711</identifier><identifier>DOI: 10.1007/s11760-023-02950-z</identifier><language>eng</language><publisher>London: Springer London</publisher><subject>Algorithms ; Authentication ; Computer Imaging ; Computer Science ; Counterfeit ; Image Processing and Computer Vision ; Image quality ; Image restoration ; Multimedia Information Systems ; Original Paper ; Pattern Recognition and Graphics ; Security ; Signal,Image and Speech Processing ; Vision ; Watermarking ; Wavelet transforms</subject><ispartof>Signal, image and video processing, 2024-04, Vol.18 (3), p.2799-2809</ispartof><rights>The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-f03303556131188c85e01b0735672136065c375ff5be9f4db444ad0887dfe8d83</citedby><cites>FETCH-LOGICAL-c319t-f03303556131188c85e01b0735672136065c375ff5be9f4db444ad0887dfe8d83</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11760-023-02950-z$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11760-023-02950-z$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Li, De</creatorcontrib><creatorcontrib>Dai, Xianlong</creatorcontrib><creatorcontrib>Gui, Jiang</creatorcontrib><creatorcontrib>Liu, Jinyan</creatorcontrib><creatorcontrib>Jin, Xun</creatorcontrib><title>A reversible watermarking for image content authentication based on wavelet transform</title><title>Signal, image and video processing</title><addtitle>SIViP</addtitle><description>In the special field of anti-counterfeit authentication, such as medical archive protection, there is a problem of copyright infringement. To protect the privacy contents and achieve lossless recovery, we propose a reversible watermarking technology. In order to solve the problem, a wavelet transform-based reversible watermarking algorithm is proposed for image content authentication. To avoid the influence of tampering on the wavelet domain of the whole image, each block is transformed by wavelet transform as the carrier signal for carrying the watermark information. In the aspect of security, two watermarks are encrypted and scrambled by chaotic mapping with different keys, which increases the security of the watermark and the randomness of embedding. In tamper detection, different levels of detection and screening are used to improve the accuracy. When restoring the tampered area, two watermarks are used to reconstruct the category and feature information of the image block. Experimental results show that, after general tampering, constant mean tampering and paste tampering, the proposed watermarking algorithm can accurately detect and locate tampered areas and can restore the approximate original image information with high quality.</description><subject>Algorithms</subject><subject>Authentication</subject><subject>Computer Imaging</subject><subject>Computer Science</subject><subject>Counterfeit</subject><subject>Image Processing and Computer Vision</subject><subject>Image quality</subject><subject>Image restoration</subject><subject>Multimedia Information Systems</subject><subject>Original Paper</subject><subject>Pattern Recognition and Graphics</subject><subject>Security</subject><subject>Signal,Image and Speech Processing</subject><subject>Vision</subject><subject>Watermarking</subject><subject>Wavelet transforms</subject><issn>1863-1703</issn><issn>1863-1711</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9UMtOwzAQtBBIVKU_wMkS54A3jh85VhUvqRIXeracZF1S2qTYbiv69bgEwY2VVjOHmVntEHIN7BYYU3cBQEmWsZynLQXLjmdkBFryDBTA-S9n_JJMQlixNDxXWuoRWUypxz360FZrpAcb0W-sf2-7JXW9p-3GLpHWfRexi9Tu4lvCtrax7Tta2YANTeRg97jGSKO3XUi2zRW5cHYdcPKDY7J4uH-dPWXzl8fn2XSe1RzKmDnGOeNCSOAAWtdaIIOKKS6kyoFLJkXNlXBOVFi6oqmKorAN01o1DnWj-ZjcDLlb33_sMESz6ne-SydNXkpdQiGLkyofVLXvQ_DozNanx_ynAWZODZqhQZMaNN8NmmMy8cEUkrhbov-L_sf1BQrOc-A</recordid><startdate>20240401</startdate><enddate>20240401</enddate><creator>Li, De</creator><creator>Dai, Xianlong</creator><creator>Gui, Jiang</creator><creator>Liu, Jinyan</creator><creator>Jin, Xun</creator><general>Springer London</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20240401</creationdate><title>A reversible watermarking for image content authentication based on wavelet transform</title><author>Li, De ; Dai, Xianlong ; Gui, Jiang ; Liu, Jinyan ; Jin, Xun</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-f03303556131188c85e01b0735672136065c375ff5be9f4db444ad0887dfe8d83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Algorithms</topic><topic>Authentication</topic><topic>Computer Imaging</topic><topic>Computer Science</topic><topic>Counterfeit</topic><topic>Image Processing and Computer Vision</topic><topic>Image quality</topic><topic>Image restoration</topic><topic>Multimedia Information Systems</topic><topic>Original Paper</topic><topic>Pattern Recognition and Graphics</topic><topic>Security</topic><topic>Signal,Image and Speech Processing</topic><topic>Vision</topic><topic>Watermarking</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, De</creatorcontrib><creatorcontrib>Dai, Xianlong</creatorcontrib><creatorcontrib>Gui, Jiang</creatorcontrib><creatorcontrib>Liu, Jinyan</creatorcontrib><creatorcontrib>Jin, Xun</creatorcontrib><collection>CrossRef</collection><jtitle>Signal, image and video processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, De</au><au>Dai, Xianlong</au><au>Gui, Jiang</au><au>Liu, Jinyan</au><au>Jin, Xun</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A reversible watermarking for image content authentication based on wavelet transform</atitle><jtitle>Signal, image and video processing</jtitle><stitle>SIViP</stitle><date>2024-04-01</date><risdate>2024</risdate><volume>18</volume><issue>3</issue><spage>2799</spage><epage>2809</epage><pages>2799-2809</pages><issn>1863-1703</issn><eissn>1863-1711</eissn><abstract>In the special field of anti-counterfeit authentication, such as medical archive protection, there is a problem of copyright infringement. To protect the privacy contents and achieve lossless recovery, we propose a reversible watermarking technology. In order to solve the problem, a wavelet transform-based reversible watermarking algorithm is proposed for image content authentication. To avoid the influence of tampering on the wavelet domain of the whole image, each block is transformed by wavelet transform as the carrier signal for carrying the watermark information. In the aspect of security, two watermarks are encrypted and scrambled by chaotic mapping with different keys, which increases the security of the watermark and the randomness of embedding. In tamper detection, different levels of detection and screening are used to improve the accuracy. When restoring the tampered area, two watermarks are used to reconstruct the category and feature information of the image block. Experimental results show that, after general tampering, constant mean tampering and paste tampering, the proposed watermarking algorithm can accurately detect and locate tampered areas and can restore the approximate original image information with high quality.</abstract><cop>London</cop><pub>Springer London</pub><doi>10.1007/s11760-023-02950-z</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1863-1703 |
ispartof | Signal, image and video processing, 2024-04, Vol.18 (3), p.2799-2809 |
issn | 1863-1703 1863-1711 |
language | eng |
recordid | cdi_proquest_journals_2968914648 |
source | Springer Nature - Complete Springer Journals |
subjects | Algorithms Authentication Computer Imaging Computer Science Counterfeit Image Processing and Computer Vision Image quality Image restoration Multimedia Information Systems Original Paper Pattern Recognition and Graphics Security Signal,Image and Speech Processing Vision Watermarking Wavelet transforms |
title | A reversible watermarking for image content authentication based on wavelet transform |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T19%3A27%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20reversible%20watermarking%20for%20image%20content%20authentication%20based%20on%20wavelet%20transform&rft.jtitle=Signal,%20image%20and%20video%20processing&rft.au=Li,%20De&rft.date=2024-04-01&rft.volume=18&rft.issue=3&rft.spage=2799&rft.epage=2809&rft.pages=2799-2809&rft.issn=1863-1703&rft.eissn=1863-1711&rft_id=info:doi/10.1007/s11760-023-02950-z&rft_dat=%3Cproquest_cross%3E2968914648%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2968914648&rft_id=info:pmid/&rfr_iscdi=true |