基于离散余弦变换的图像认证公钥无关脆弱水印

Chinchen Chang, H. Chou
{"title":"基于离散余弦变换的图像认证公钥无关脆弱水印","authors":"Chinchen Chang, H. Chou","doi":"10.1109/FGCNS.2008.9","DOIUrl":null,"url":null,"abstract":"In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt another approach to retain its blockwise independent property. Our scheme can avoid the conditions necessary for such attacks to be feasible. Furthermore, our scheme extracts the inherent image features and embed them into this image as the watermark. This relieves users from having to maintain a database of watermarks from various sources. Experimental results show that the watermark insertion procedure has little effect on the visual quality of the watermarked image. They also show our scheme can locate the modifications made to the watermarked image, including image scaling, cropping, geometric distortion, pixel value changes, etc.","PeriodicalId":370780,"journal":{"name":"2008 Second International Conference on Future Generation Communication and Networking Symposia","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A New Public-Key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform\",\"authors\":\"Chinchen Chang, H. Chou\",\"doi\":\"10.1109/FGCNS.2008.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt another approach to retain its blockwise independent property. Our scheme can avoid the conditions necessary for such attacks to be feasible. Furthermore, our scheme extracts the inherent image features and embed them into this image as the watermark. This relieves users from having to maintain a database of watermarks from various sources. Experimental results show that the watermark insertion procedure has little effect on the visual quality of the watermarked image. They also show our scheme can locate the modifications made to the watermarked image, including image scaling, cropping, geometric distortion, pixel value changes, etc.\",\"PeriodicalId\":370780,\"journal\":{\"name\":\"2008 Second International Conference on Future Generation Communication and Networking Symposia\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Second International Conference on Future Generation Communication and Networking Symposia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FGCNS.2008.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Second International Conference on Future Generation Communication and Networking Symposia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FGCNS.2008.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

本文提出了一种新的基于离散余弦变换的遗忘脆弱水印算法。它的灵感来自于Wong在1998年提出的公钥水印方案,旨在提高其对Barreto和Holliman指出的可能攻击的脆弱性。正如Barreto所建议的那样,我们没有使用上下文信息并使其成为块间依赖的方案,而是采用另一种方法来保留其块独立属性。我们的方案可以避免这种攻击可行的必要条件。此外,我们的方案提取图像的固有特征并将其作为水印嵌入到图像中。这使用户不必维护来自各种来源的水印数据库。实验结果表明,水印插入过程对水印图像的视觉质量影响不大。实验结果表明,该算法可以对水印图像的修改进行定位,包括图像缩放、裁剪、几何失真、像素值变化等。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A New Public-Key Oblivious Fragile Watermarking for Image Authentication Using Discrete Cosine Transform
In this paper, a new oblivious fragile watermarking using discrete cosine transform is proposed. It is inspired by Wong's public key watermarking scheme proposed in 1998 and aims to improve its vulnerability towards possible attacks indicated by Barreto and Holliman. Instead of making use of contextual information and making it an inter-block dependent scheme, as suggested by Barreto, we adopt another approach to retain its blockwise independent property. Our scheme can avoid the conditions necessary for such attacks to be feasible. Furthermore, our scheme extracts the inherent image features and embed them into this image as the watermark. This relieves users from having to maintain a database of watermarks from various sources. Experimental results show that the watermark insertion procedure has little effect on the visual quality of the watermarked image. They also show our scheme can locate the modifications made to the watermarked image, including image scaling, cropping, geometric distortion, pixel value changes, etc.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Approach to Event Recognition for Visual Surveillance Systems Lossless Information Hiding Scheme Based on Neighboring Correlation HSV Color Space and Face Detection Based Objectionable Image Detecting User Interface Concurrency in Web Service Client Systems Visuo-Motor Coordination in Bipedal Humanoid Robot Walking
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1