{"title":"JPEG图像认证中半脆弱水印的比较研究","authors":"A. Egorova, V. Fedoseev","doi":"10.1109/ISDFS.2019.8757535","DOIUrl":null,"url":null,"abstract":"One of the ways to protect images from tampering is embedding digital watermarks destroyed by unauthorized changes. The development of digital watermarking methods that are robust against allowable transformations, whose most typical example is lossy compression, presents a challenging task. Such methods and watermarks embedded by them are called semi-fragile. The paper considers different semi-fragile watermarking techniques that resisting JPEG. We focus on the analysis of the effect of watermark capacity, positions of spectral coefficients selected for embedding, and specific algorithms of coefficients modification on the quality of the resulting (secure) image and the authentication accuracy. In the paper, we also provide recommendations on the choice of the best combinations of these parameters depending on the terms of use of a protected image.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Semi-Fragile Watermarking for JPEG Image Authentication: A Comparative Study\",\"authors\":\"A. Egorova, V. Fedoseev\",\"doi\":\"10.1109/ISDFS.2019.8757535\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the ways to protect images from tampering is embedding digital watermarks destroyed by unauthorized changes. The development of digital watermarking methods that are robust against allowable transformations, whose most typical example is lossy compression, presents a challenging task. Such methods and watermarks embedded by them are called semi-fragile. The paper considers different semi-fragile watermarking techniques that resisting JPEG. We focus on the analysis of the effect of watermark capacity, positions of spectral coefficients selected for embedding, and specific algorithms of coefficients modification on the quality of the resulting (secure) image and the authentication accuracy. In the paper, we also provide recommendations on the choice of the best combinations of these parameters depending on the terms of use of a protected image.\",\"PeriodicalId\":247412,\"journal\":{\"name\":\"2019 7th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"61 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 7th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS.2019.8757535\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS.2019.8757535","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Semi-Fragile Watermarking for JPEG Image Authentication: A Comparative Study
One of the ways to protect images from tampering is embedding digital watermarks destroyed by unauthorized changes. The development of digital watermarking methods that are robust against allowable transformations, whose most typical example is lossy compression, presents a challenging task. Such methods and watermarks embedded by them are called semi-fragile. The paper considers different semi-fragile watermarking techniques that resisting JPEG. We focus on the analysis of the effect of watermark capacity, positions of spectral coefficients selected for embedding, and specific algorithms of coefficients modification on the quality of the resulting (secure) image and the authentication accuracy. In the paper, we also provide recommendations on the choice of the best combinations of these parameters depending on the terms of use of a protected image.