{"title":"A Wavelet-Based Watermarking Scheme with Authentication and Recovery Mechanism","authors":"Liu Hui, Hua Yuping","doi":"10.1109/ICECE.2010.86","DOIUrl":null,"url":null,"abstract":"In this paper, a wavelet-based. watermarking scheme used to verify the contents of transmission grayscale images is proposed. By the property of discrete wavelet transform, we design two watermarks from the low-frequency band and embed the watermarks into the high-frequency bands. One watermark is used for detecting the intentional content modification and indicating the modified location, and anther watermark is used for recovering the image. The watermark generation and watermark embedding are disposed in the image itself, and the received image authentication needs no information about the original image or watermark, so it will increase the security of watermark and prevent forged watermark. The experimental results show that the proposed scheme can resist the mild modifications of digital image and be able to detect and recovery the malicious modifications precisely.","PeriodicalId":6419,"journal":{"name":"2010 International Conference on Electrical and Control Engineering","volume":"14 1","pages":"323-326"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Electrical and Control Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECE.2010.86","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
In this paper, a wavelet-based. watermarking scheme used to verify the contents of transmission grayscale images is proposed. By the property of discrete wavelet transform, we design two watermarks from the low-frequency band and embed the watermarks into the high-frequency bands. One watermark is used for detecting the intentional content modification and indicating the modified location, and anther watermark is used for recovering the image. The watermark generation and watermark embedding are disposed in the image itself, and the received image authentication needs no information about the original image or watermark, so it will increase the security of watermark and prevent forged watermark. The experimental results show that the proposed scheme can resist the mild modifications of digital image and be able to detect and recovery the malicious modifications precisely.