Abstract
In this paper we propose a semi-fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by the l-level discrete wavelet transformation. Then the approximate wavelet coefficient matrix of the original image and the real-value chaotic sequences are used to generate the content-based and secure watermark. The watermark is embedded into original image by using the technique of HVS. The tamper detection can identify the tampered region of the received watermarked image which may be undergone tamper attacked. Experimental results are excellent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Reference
Hui Xiang, et al. Digital Watermarking Systems with Chaotic Sequences. In: Proceeding of SPIE conf. San Jose, CA, USA, 1999, 3657:449–457
R. B. Wolfgang and E. J. Delp, “Fragile Watermarking Using the VW2D Watermark”, Proc. SPIE conf., San Jose, California, Jan 25-27, 1999, pp. 204–213.
Eugene T. Lin, et al. Detection of Image Alterations Using Semi-Fragile Watermarks. In: Proc. of the SPIE Conf., San Jose, CA., 2000,Vol.3971
C.-Y. Lin and S.-F. Chang. Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: Proc. Of SPIE conf., San Jose, California, 2000, vol. 3971
M. Schneider and S.-F. Chang, “A Content-Based Approach to Image Signature Generation and Authentication”, Proc. ICIP ‘96 vol. III, pp. 227–230, 1996.
A.S. Lewis and G. Knowles. Image compression using the 2-D wavelet transformation. IEEE Trans. Image Processing 1,pp 244–250,April 1992
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shi, J., Yi, K. (2001). New Semi-fragile Authentication Watermarking. In: Shum, HY., Liao, M., Chang, SF. (eds) Advances in Multimedia Information Processing — PCM 2001. PCM 2001. Lecture Notes in Computer Science, vol 2195. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45453-5_130
Download citation
DOI: https://doi.org/10.1007/3-540-45453-5_130
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42680-6
Online ISBN: 978-3-540-45453-3
eBook Packages: Springer Book Archive