{"title":"基于线性方程的块特征相关图像水印篡改检测","authors":"Chin-Feng Lee, Kuo-Nan Chen, Chinchen Chang, Meng-Cheng Tsai","doi":"10.1109/IAS.2009.147","DOIUrl":null,"url":null,"abstract":"A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding procedure. In the detection stage, ISB matching revisited will be applied to extract the authentication information and to verify whether the image blocks have been tampered with. The authentication information establishes the block feature correlation. This kind of correlation helps resist VQ attack.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation\",\"authors\":\"Chin-Feng Lee, Kuo-Nan Chen, Chinchen Chang, Meng-Cheng Tsai\",\"doi\":\"10.1109/IAS.2009.147\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding procedure. In the detection stage, ISB matching revisited will be applied to extract the authentication information and to verify whether the image blocks have been tampered with. The authentication information establishes the block feature correlation. This kind of correlation helps resist VQ attack.\",\"PeriodicalId\":240354,\"journal\":{\"name\":\"2009 Fifth International Conference on Information Assurance and Security\",\"volume\":\"95 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-08-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Fifth International Conference on Information Assurance and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IAS.2009.147\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fifth International Conference on Information Assurance and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAS.2009.147","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation
A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding procedure. In the detection stage, ISB matching revisited will be applied to extract the authentication information and to verify whether the image blocks have been tampered with. The authentication information establishes the block feature correlation. This kind of correlation helps resist VQ attack.