Tamper Detection and Self-Recovery Watermarking Scheme Based on DWT-SVD

Article Preview

Abstract:

This paper studied the image tamper detection and recovery watermarking scheme based on the discrete wavelet transformation(DWT) and the singular value decomposition (SVD).By the property of DWT and SVD , we design two watermarks which are embedded into the high-frequency bands of the DWT domain.One watermark is from the U component of the SVD domain and used for detecting the intentional content modification and indicating the modified location, and another watermark is from the low-frequency of DWT and used for recovering the image. The watermark generation and watermark embedding are disposed in the image itself. The experimental results show that the proposed scheme can resist the mild modifications of digital image and be able to detect and recovery the malicious modifications precisely.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 225-226)

Pages:

614-618

Citation:

Online since:

April 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chaluvadi, S.B.; Prasad, M.V.N.K. Efficient image tamper detection and recovery technique using dual watermark . NaBIC 2009. World Congress on Digital Object(2009), P: 993 - 998.

DOI: 10.1109/nabic.2009.5393888

Google Scholar

[2] Maeno K, Sun Q, Chang S F, Suto M. New Semi-Fragile Image Authentication Watermarking Techniques Using Random Bias and Nonuniform Quantization. IEEE Trans. Multimedia, vol. 8, No. 1(2006), pp.32-45.

DOI: 10.1109/tmm.2005.861293

Google Scholar

[3] Chang, C C, Hu Y S , Lu T C. A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letter, vol. 27, 2006 , pp.439-446.

DOI: 10.1016/j.patrec.2005.09.006

Google Scholar

[4] Lin P L, Huang P W, Peng A W. A Fragile Watermarking Scheme for Image Authentication with Localization and Recovery. Proc. of the IEEE sixth Int. Symp. On Multimedia Software Engineering(2004), pp.146-153.

DOI: 10.1109/mmse.2004.9

Google Scholar

[5] Lin P L, Hsieh C K, Huang P W. Hierarchical Watermarking Scheme for Image Authentication and Recovery". IEEE Int. Conf. on Multimedia and Expo(2004), pp.963-966.

DOI: 10.1109/icme.2004.1394362

Google Scholar

[6] Tsai. P, Hu Y C. A Watermarking-Based Authentication with Malicious Detection and Recovery. Int. Conf. of Information, Communication and Signal Processing( 2005), pp.865-869.

DOI: 10.1109/icics.2005.1689172

Google Scholar

[7] Ruizhen Liu and Tieniu Tan. An SVD-based watermarking method for protecting rightful ownership. EEE transaction on multimedia(2002 ), vol. 4, No. 1, pp.121-128.

DOI: 10.1109/6046.985560

Google Scholar

[8] Watson, A.B., Yang, G.Y., Solomon, J. A., Villasenor, J. Visibility of wavelet quantization noise. IEEE Tran. On Image Processing, (1997). Vol. 6, No. 8, pp.1164-1175.

DOI: 10.1109/83.605413

Google Scholar