Paper Title:
Tamper Detection and Self-Recovery Watermarking Scheme Based on DWT-SVD
  Abstract

This paper studied the image tamper detection and recovery watermarking scheme based on the discrete wavelet transformation(DWT) and the singular value decomposition (SVD).By the property of DWT and SVD , we design two watermarks which are embedded into the high-frequency bands of the DWT domain.One watermark is from the U component of the SVD domain and used for detecting the intentional content modification and indicating the modified location, and another watermark is from the low-frequency of DWT and used for recovering the image. The watermark generation and watermark embedding are disposed in the image itself. The experimental results show that the proposed scheme can resist the mild modifications of digital image and be able to detect and recovery the malicious modifications precisely.

  Info
Periodical
Advanced Materials Research (Volumes 225-226)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
614-618
DOI
10.4028/www.scientific.net/AMR.225-226.614
Citation
Y. P. Hu , J. Zhang, H. Yin, Y. C. Liu, Y. H. Liang, "Tamper Detection and Self-Recovery Watermarking Scheme Based on DWT-SVD", Advanced Materials Research, Vols. 225-226, pp. 614-618, 2011
Online since
April 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Grace C.W. Ting, Bok Min Goi, S. W. Lee
Abstract:H.264/AVC is a widespread standard for high definition video (HD) for example DVD and HD videos on the internet. To prevent unauthorized...
552
Authors: Chun Jiang Pang
Chapter 5: Information Processing and Computational Science
Abstract:This paper analyzes a sort of color still image algorithm based on the Logistic map sorting, and verifies the confidentiality. Further, this...
850
Authors: Fei Li, Ling Tang
Chapter 5: Applied Computer Technologies and Control
Abstract:Semi-fragile digital watermarking is able to distinguish between accidental attacks and malicious tampering, thus been closely watched in...
814
Authors: Yan Yan, Yuan Sun, Hui Qin Wang, Ying Lin, Hai Yan Chen
Chapter 6: Data Acquisition and Data Processing, Computational Techniques
Abstract:A new reversible watermarking algorithm for image authentication, which embeds authentication information into the sub-band coefficients...
1379
Authors: Shi Guo Jin, Guang Jiang Wang
Chapter 3: Advanced Technologies in Machinery, Mechatronics, Automation and Control
Abstract:The hash function is the acceptance of variable length data input, and generating function of fixed length data output. Message integrity...
250