• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
Volume 21 Issue 6
Dec.  2008
Turn off MathJax
Article Contents
FAN Mingquan, WANG Hongxia. Fragile Watermarking Scheme with Abilities of Self-restoration and Discrimination of Tampers on Image Content or Watermark[J]. Journal of Southwest Jiaotong University, 2008, 21(6): 799-805.
Citation: FAN Mingquan, WANG Hongxia. Fragile Watermarking Scheme with Abilities of Self-restoration and Discrimination of Tampers on Image Content or Watermark[J]. Journal of Southwest Jiaotong University, 2008, 21(6): 799-805.

Fragile Watermarking Scheme with Abilities of Self-restoration and Discrimination of Tampers on Image Content or Watermark

  • Received Date: 15 May 2007
  • Publish Date: 25 Dec 2008
  • Based on the fact that the current fragile watermarking scheme with the ability of tamper discrimination can not discriminate tampers effectively,a novel fragile watermarking scheme with the abilities of self-restoration and discrimination of tampers on image content or watermark was proposed.In this scheme,the authentication watermark is used to localize and discriminate tampers,and the resumptive watermark is utilized to resume the tampered image content.Theoretical analysis and experimental simulation show that the proposed scheme has good abilities of tamper discrimination,tamper localization and tamper restoring,even more the ability of resisting synchronization counterfeit attack and key analysis attack.

     

  • loading
  • FRIDRICHJ,GOLJAN M.Images with self-correcting capahilities[C] //In Proceedings of the IEEE International Conference on Image Processing.Kobe:IEEE Press,1999:25-28.[2] TEFAS A,PITAS L.Image authentication using chaotic mixing systems[C] //Proceedings of IEEE International Conference on Circuits and Systems:Symposium.Sydeney:IEEE Press,2000:216-219.[3] WONG P W,MEMON N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Tram.on Image Processing,2001,10(10):1 593-1 601.[4] LU C S,MARK LIAO H Y.Multipurpese watermarking for image authentication and protection[J].IEEE Trans.on Image Processing,2001,10(10):1 579-1 592.[5] CELIK M U,SHARMA G,SABER E.Hierarchical watermarking for secure image authentication with localization[J].IEEE Trans.on Image Processing,2002,11(6):585-595.[6] WONG P W.A public key watermark for image verification and authentication[C] //In Proceedings of the IEEE International Conference on Image Processing.Chicago:IEEE Press,1998:455-459.[7] 和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1 557-1 561.HE Hongjie,ZHANG Jiashu,TIAN Lei.A fragile watermarking scheme with discrimination of tampers on image or watermark[J].Acta Electronica Sinica,2005,33 (9):1 557-1 561.[8] 王宏霞,罗键.基于图像连通性的自适应水印同步方案[J].西南交通大学学报,2005,40(6):720-726.WANG Hongxia,LUO Jian.Selfadaptive watermarking synchronization scheme based on image connectivity[J].Journal of Southwest Jiaotong University,2005,40(6):720-726.[9] WANG Hongxia,LUO Jian.Connectivity-based watermarking robust to geometrical attacks[J].Journal of Southwest Jiaotong University,2006,14(1):1-6.[10] 和红杰,张家树.一种安全的自嵌入及篡改检测和恢复算法[J].哈尔滨工业大学学报(增刊),2006,38:889-892.HE Hongjie,ZHANG Jiashu.A secure self embedding watermarking scheme with tamper detection and restoration[J].Journal of Harbin Institute of Technology,2006,38:889-892.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索
    Article views(1579) PDF downloads(338) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return