Watermarking algorithm for authentication and self-recovery of tampered images using DWT

Javier Molina-Garcia, R. Reyes-Reyes, V. Ponomaryov, Clara Cruz-Ramos
{"title":"Watermarking algorithm for authentication and self-recovery of tampered images using DWT","authors":"Javier Molina-Garcia, R. Reyes-Reyes, V. Ponomaryov, Clara Cruz-Ramos","doi":"10.1109/MSMW.2016.7538148","DOIUrl":null,"url":null,"abstract":"Nowadays the use of digital images is a common practice worldwide, they are used for social, commercial or legal purposes among others; therefore it is important to detect malicious alterations in this type of content, to avoid possible social, legal or personal damages. Currently there are various proposed techniques to solve this problem. However, most of these proposals can only protect a region of interest within digital image, making feasible even with these methods, the alteration of certain regions that are not protected. Therefore, this paper proposes a digital image watermarking algorithm, which consists of two stages; the first one is to protect the digital image that is performed by Daubechies DWT, halftoning and QIM methods; the second one is used for authentication, detection and self-recovery of tampered regions, through IDWT, inverse halftoning and median filtering. Experimental results have demonstrated the effectiveness of the proposed algorithm, obtaining average PSNR values of 35 dB in the self-recovery image, even if the watermarked image was subjected to a JPEG compression using a quality factor QF=75.","PeriodicalId":6504,"journal":{"name":"2016 9th International Kharkiv Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves (MSMW)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 9th International Kharkiv Symposium on Physics and Engineering of Microwaves, Millimeter and Submillimeter Waves (MSMW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSMW.2016.7538148","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20

Abstract

Nowadays the use of digital images is a common practice worldwide, they are used for social, commercial or legal purposes among others; therefore it is important to detect malicious alterations in this type of content, to avoid possible social, legal or personal damages. Currently there are various proposed techniques to solve this problem. However, most of these proposals can only protect a region of interest within digital image, making feasible even with these methods, the alteration of certain regions that are not protected. Therefore, this paper proposes a digital image watermarking algorithm, which consists of two stages; the first one is to protect the digital image that is performed by Daubechies DWT, halftoning and QIM methods; the second one is used for authentication, detection and self-recovery of tampered regions, through IDWT, inverse halftoning and median filtering. Experimental results have demonstrated the effectiveness of the proposed algorithm, obtaining average PSNR values of 35 dB in the self-recovery image, even if the watermarked image was subjected to a JPEG compression using a quality factor QF=75.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于DWT的篡改图像认证和自恢复水印算法
如今,数字图像的使用在世界范围内是一种普遍的做法,它们被用于社会、商业或法律目的等;因此,检测这类内容中的恶意更改非常重要,以避免可能的社会、法律或个人损害。目前有各种建议的技术来解决这个问题。然而,这些建议大多只能保护数字图像中感兴趣的区域,即使使用这些方法,对某些不受保护的区域进行更改也是可行的。为此,本文提出了一种数字图像水印算法,该算法分为两个阶段;一是对采用小波变换、半调和QIM方法处理的数字图像进行保护;第二部分通过IDWT、逆半调和中值滤波对篡改区域进行认证、检测和自恢复。实验结果证明了该算法的有效性,即使使用质量因子QF=75对水印图像进行JPEG压缩,也能在自恢复图像中获得35 dB的平均PSNR值。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
High power THz technologies opened by high frequency gyrations covering Sub-THz to THz region Watermarking algorithm for authentication and self-recovery of tampered images using DWT Use of electromagnetic wave refraction for multicomponent gas-metal plasma diagnostics Calculation of autodyne radar noise parameters ATI SAR simulation shows signatures of complex objects
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1