{"title":"基于金字塔结构和梯度预测图像的可逆脆弱水印","authors":"F. Yeh, Greg C. Lee, Cheng-Chieh Chiang","doi":"10.1109/IIH-MSP.2007.269","DOIUrl":null,"url":null,"abstract":"The purpose of this research lies in the development of a reversible fragile watermarking scheme that not only can restore the original image but can also both correctly identify and localize unauthorized manipulations to a protected image. The similarities among the detail components of a pyramid-structure image are exploited to select appropriate embedding areas, and then the cryptographic watermarks are embedded into selected wavelet coefficients using a difference-expansion method. No extra space is required to store the watermark information, watermarks and watermark location map. Experimental results show that the proposed scheme can successfully obtain original image if protected image is unaltered, and unauthorized manipulations can be correctly identified and localized even when protected images undergoes a cropping attack.","PeriodicalId":385132,"journal":{"name":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reversible Fragile Watermarking Based on Pyramidal Structure and Gradient Predicting Image\",\"authors\":\"F. Yeh, Greg C. Lee, Cheng-Chieh Chiang\",\"doi\":\"10.1109/IIH-MSP.2007.269\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of this research lies in the development of a reversible fragile watermarking scheme that not only can restore the original image but can also both correctly identify and localize unauthorized manipulations to a protected image. The similarities among the detail components of a pyramid-structure image are exploited to select appropriate embedding areas, and then the cryptographic watermarks are embedded into selected wavelet coefficients using a difference-expansion method. No extra space is required to store the watermark information, watermarks and watermark location map. Experimental results show that the proposed scheme can successfully obtain original image if protected image is unaltered, and unauthorized manipulations can be correctly identified and localized even when protected images undergoes a cropping attack.\",\"PeriodicalId\":385132,\"journal\":{\"name\":\"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIH-MSP.2007.269\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIH-MSP.2007.269","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reversible Fragile Watermarking Based on Pyramidal Structure and Gradient Predicting Image
The purpose of this research lies in the development of a reversible fragile watermarking scheme that not only can restore the original image but can also both correctly identify and localize unauthorized manipulations to a protected image. The similarities among the detail components of a pyramid-structure image are exploited to select appropriate embedding areas, and then the cryptographic watermarks are embedded into selected wavelet coefficients using a difference-expansion method. No extra space is required to store the watermark information, watermarks and watermark location map. Experimental results show that the proposed scheme can successfully obtain original image if protected image is unaltered, and unauthorized manipulations can be correctly identified and localized even when protected images undergoes a cropping attack.