{"title":"A Contourlet-Based Image Watermarking Resisting to JPEG Compression","authors":"Junpeng Zhang, Huaijing Qu, Hongjuan Yang","doi":"10.2174/1874444301507012215","DOIUrl":null,"url":null,"abstract":"A novel image authentication algorithm resisting to JPEG compression is proposed. The authentication water- mark is generated based on the stability of relationship of adjacent Contourlet transform coefficients before and after JPEG. According to the random block mapping, the watermark is embedded into the discrete cosine transform (DCT) co- efficients of other image blocks. The tampering identification matrix is determined by the difference between extracted watermark and reconstructed watermark, and adjacent region comparison is adopted to determine the authenticity of im- age blocks. Experimental results show that the algorithm can achieve blind detection with better resistance to JPEG com- pression, also able to position malicious tampering more accurately.","PeriodicalId":153592,"journal":{"name":"The Open Automation and Control Systems Journal","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Open Automation and Control Systems Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/1874444301507012215","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A novel image authentication algorithm resisting to JPEG compression is proposed. The authentication water- mark is generated based on the stability of relationship of adjacent Contourlet transform coefficients before and after JPEG. According to the random block mapping, the watermark is embedded into the discrete cosine transform (DCT) co- efficients of other image blocks. The tampering identification matrix is determined by the difference between extracted watermark and reconstructed watermark, and adjacent region comparison is adopted to determine the authenticity of im- age blocks. Experimental results show that the algorithm can achieve blind detection with better resistance to JPEG com- pression, also able to position malicious tampering more accurately.