Skip to main content

New Semi-fragile Authentication Watermarking

  • Conference paper
  • First Online:
Advances in Multimedia Information Processing — PCM 2001 (PCM 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2195))

Included in the following conference series:

  • 699 Accesses

Abstract

In this paper we propose a semi-fragile watermarking scheme, which can be used for image authentication. Let the original image be performed by the l-level discrete wavelet transformation. Then the approximate wavelet coefficient matrix of the original image and the real-value chaotic sequences are used to generate the content-based and secure watermark. The watermark is embedded into original image by using the technique of HVS. The tamper detection can identify the tampered region of the received watermarked image which may be undergone tamper attacked. Experimental results are excellent.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. Hui Xiang, et al. Digital Watermarking Systems with Chaotic Sequences. In: Proceeding of SPIE conf. San Jose, CA, USA, 1999, 3657:449–457

    Google Scholar 

  2. R. B. Wolfgang and E. J. Delp, “Fragile Watermarking Using the VW2D Watermark”, Proc. SPIE conf., San Jose, California, Jan 25-27, 1999, pp. 204–213.

    Google Scholar 

  3. Eugene T. Lin, et al. Detection of Image Alterations Using Semi-Fragile Watermarks. In: Proc. of the SPIE Conf., San Jose, CA., 2000,Vol.3971

    Google Scholar 

  4. C.-Y. Lin and S.-F. Chang. Semi-Fragile Watermarking for Authenticating JPEG Visual Content. In: Proc. Of SPIE conf., San Jose, California, 2000, vol. 3971

    Google Scholar 

  5. M. Schneider and S.-F. Chang, “A Content-Based Approach to Image Signature Generation and Authentication”, Proc. ICIP ‘96 vol. III, pp. 227–230, 1996.

    Google Scholar 

  6. A.S. Lewis and G. Knowles. Image compression using the 2-D wavelet transformation. IEEE Trans. Image Processing 1,pp 244–250,April 1992

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shi, J., Yi, K. (2001). New Semi-fragile Authentication Watermarking. In: Shum, HY., Liao, M., Chang, SF. (eds) Advances in Multimedia Information Processing — PCM 2001. PCM 2001. Lecture Notes in Computer Science, vol 2195. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45453-5_130

Download citation

  • DOI: https://doi.org/10.1007/3-540-45453-5_130

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42680-6

  • Online ISBN: 978-3-540-45453-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics