Adaptive Semi-Fragile Watermarking Based on Complete Quantization and Image Contents

Article Preview

Abstract:

Complete quantization principle is proposed in this paper, based on which, an adaptive semi-fragile watermarking algorithm based on image contents is proposed. The algorithm uses the low frequency sub-band to construct watermarking related to the content of image, and then uses just noticeable difference of wavelet domain to embed watermarking by means of complete quantitative principle. Experiments show this algorithm can classify malicious and non-malicious manipulations accurately.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2983-2988

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Ekici Ö, Sankur B, Akcay M. Comparative assessment of semifragile watermarking methods[J]. Journal of Electronic Imaging, 2004, 13(1): 209-216.

DOI: 10.1117/1.1633285

Google Scholar

[2] Zhang Jing, Zhang Chuntian. Digital watermarking techniques for image authentication[J]. Journal of Image and Graphics 2003, 8(4): 367-373.

Google Scholar

[3] Che Shengbing, Huang Da, Li Guang. Semi-fragile image watermarking algorithm based on visual features[J]. Journal on Communications, 2007, 28(10): 134-140.

Google Scholar

[4] Tang qian. Study on semi-fragile watermarking algorithm based on edge detection[J]. Computer engineering, 2011, 37(11): 178-180.

Google Scholar

[5] Lewis A S, Knowles G. Image compression using the 2-D wavelet transformation[J]. IEEE Transactions on Image Processing, 1992, 1(4): 244-250.

DOI: 10.1109/83.136601

Google Scholar

[6] Wang Xiangyang, Yang Hongying, Chen Like, Zhao Hong. A new semi-fragile image watermarking based on visual masking[J]. Journal of Image and Graphics, 2005, 10(12): 1548-1553.

Google Scholar

[7] Kundur D, Hatzinakos D. Towards a telltale watermarking technique for tamper proofing[A]. Proceedings of the IEEE International Conference on Image Processing[C], Chicago, USA, 1998, 2: 409-413.

DOI: 10.1109/icip.1998.723403

Google Scholar

[8] Li J. Photo graphy image database[EB/OL]. http: /www. stat. psu. edu/jiali/index. download. htm.

Google Scholar

[9] Gopalakrishnan, T.; Ramakrishnan, S.; Balasamy, K.; Murugavel, A.S.M. Semi fragile watermarking using Gaussian mixture model for malicious image attacks [C]. 2011 World Congress on Information and Communication Technologies, 2011: 120 – 125.

DOI: 10.1109/wict.2011.6141229

Google Scholar