A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication(Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against tampering. The watermark image for authentication is reconstructed by taking a weighted vote on the extracted bits. The bits that lose the vote are treated as having been tampered with, and the locations of the lost bits as indicating tampered positions. Thus, authentication and tamper-proofing can be done by observing the images of watermarks that win and lose votes. Sieving, emphasis, and weighted vote were found to be effectively make the authentication and tamper detection more accurate. The proposed scheme is robust against JPEG compression or acceptable modifications, but sensitive to malicious attacks such as cutting and pasting.
- 一般社団法人電子情報通信学会の論文
- 2007-05-01
著者
-
Abe Koki
Department Of Computer Science
-
ISHIHARA Nozomi
Department of Computer Science, The University of Electro-Communications
-
Ishihara Nozomi
Department Of Computer Science The University Of Electro-communications
-
Ishihara Nozomi
Univ. Electro‐communications Chofu‐shi Jpn
関連論文
- Enhancing TCP performance by identifying wireless losses (ネットワークシステム)
- Parallel Architecture for 2-D Discrete Wavelet Transform with Low Energy Consumption
- A Protocol Specification-Based Intrusion Detection System for VoIP and Its Evaluation
- Hardware Design and Implementation of IP-over-1394 Protocol Stack and Its Evaluation
- Speeding up the Tile Size Transformation of Wavelet Transform Coefficients in Image Data through Partial Retrieval of Intermediate Coefficients
- Gynecomastia associated with low-dose methotrexate therapy for rheumatoid arthritis
- Protocol specification-based intrusion detection system for VoIP (情報ネットワーク)
- Speeding up the Tile Size Transformation of Wavelet Transform Coefficients in Image Data through Partial Retrieval of Intermediate Coefficients
- Speeding up the Tile Size Transformation of Wavelet Transform Coefficients in Image Data through Partial Retrieval of Intermediate Coefficients
- HYGIENIC STUDIES ON THE INSTANT RAH MEIN : II . A Quantitative Analysis of the Salt in the Instant Rah Mein
- Specification of TinyIPv6 Protocol Stack for Remote Control and Its Implementation on FPGA (特集 e-Japan時代のインターネット/分散システムの構築・運用技術)
- A scalable and efficient scheme for privacy-protected RFID systems (情報ネットワーク)
- A Cost-Effective Handshake Protocol and Its Implementation for Bundled-Data Asynchronous Circuits(VLSI Design Technology and CAD)
- Magnetocrystalline Anisotropy of Low Temperature Phase of Magnetite
- An Optimum Design of FFT Multi-Digit Multiplier and Its VLSI Implementation
- A Semi-Fragile Watermarking Scheme Using Weighted Vote with Sieve and Emphasis for Image Authentication(Information Security)
- Some Correlations between the Findings of Preoperative Coronary Arteriography and Benefit of Vineberg's Operation
- AN ANALYTICAL STUDY OF THE GROWTH CURVE
- Sudden Glottic Stenosis Caused by Cricoarytenoid Joint Involvement due to Rheumatoid Arthritis