{"title":"图像认证的脆弱水印方案","authors":"G. P. Betancourth","doi":"10.1109/HSI.2012.32","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a fragile watermarking scheme in wavelet domain which is sensitive to all kinds of modifications and has the ability to localize the tampered regions. The proposed scheme is a key-dependent, content based and non-deterministic neighborhood-dependent method so that it can resist the well-known attacks including the transplantation attack and vector quantization attack. The most remarkable feature of the proposed scheme is that only a small number of wavelet coefficients are watermarked but all are implicitly protected. So the embedding distortion is dramatically reduced without compromising the authentication resolution. In addition, analyses on both algorithm and security of the scheme are provided, and the simulation results are also presented to visually validate the proposed scheme.","PeriodicalId":222377,"journal":{"name":"2012 5th International Conference on Human System Interactions","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"34","resultStr":"{\"title\":\"Fragile Watermarking Scheme for Image Authentication\",\"authors\":\"G. P. Betancourth\",\"doi\":\"10.1109/HSI.2012.32\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a fragile watermarking scheme in wavelet domain which is sensitive to all kinds of modifications and has the ability to localize the tampered regions. The proposed scheme is a key-dependent, content based and non-deterministic neighborhood-dependent method so that it can resist the well-known attacks including the transplantation attack and vector quantization attack. The most remarkable feature of the proposed scheme is that only a small number of wavelet coefficients are watermarked but all are implicitly protected. So the embedding distortion is dramatically reduced without compromising the authentication resolution. In addition, analyses on both algorithm and security of the scheme are provided, and the simulation results are also presented to visually validate the proposed scheme.\",\"PeriodicalId\":222377,\"journal\":{\"name\":\"2012 5th International Conference on Human System Interactions\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"34\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 5th International Conference on Human System Interactions\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HSI.2012.32\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 5th International Conference on Human System Interactions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HSI.2012.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fragile Watermarking Scheme for Image Authentication
In this paper, we propose a fragile watermarking scheme in wavelet domain which is sensitive to all kinds of modifications and has the ability to localize the tampered regions. The proposed scheme is a key-dependent, content based and non-deterministic neighborhood-dependent method so that it can resist the well-known attacks including the transplantation attack and vector quantization attack. The most remarkable feature of the proposed scheme is that only a small number of wavelet coefficients are watermarked but all are implicitly protected. So the embedding distortion is dramatically reduced without compromising the authentication resolution. In addition, analyses on both algorithm and security of the scheme are provided, and the simulation results are also presented to visually validate the proposed scheme.