DocumentCode :
3387774
Title :
Compressed-domain fragile watermarking scheme for distinguishing tampers on image content or watermark
Author :
Wang, Hongxia ; Liao, Changxing
Author_Institution :
Sch. of Inf. Sci. & Technol., Southwest Jiaotong Univ., Chengdu, China
fYear :
2009
fDate :
23-25 July 2009
Firstpage :
480
Lastpage :
484
Abstract :
Nowadays the compressed format files such as JPEG are used widely, but the existing compressed-domain fragile watermarking algorithms can not recognize whether the modification made to the watermarked image is on the image contents or the embedded watermark or both tampered by attackers. In this paper, a compressed-domain fragile watermarking scheme with discrimination of tampers on image content or watermark is proposed. The quantized DCT (discrete cosine transform) coefficients of 7 most significant bits (MSBs) after decoding are mapped to the initial values of the chaotic system, and then generate content-based fragile watermark by chaotic motion. After watermark permutation by the chaotic sequence, the operations of embedding and extracting the improved security watermark are all in the compressed domain. During authentication, the proposed method is able to detect the tampered location and discriminate tampers on image content or watermark from the distribution density of nonzero elements in the tamper detection matrix. The quantized DCT coefficients after decoding is used directly for watermark embedding, which avoids a large of computation on full decoding and re-encoding process. Therefore, the proposed algorithm has a great efficiency when it is implemented. Furthermore, thanks to the high sensitivity on initial values and the good randomness of the chaotic system, the very accurate localization is not only realized for the malicious tampers to JPEG images, but also indicate whether the modification made to the watermarked image is on the image contents or the embedded watermark or both. Simulation results show the effectiveness, sensitivity and ability of tamper localization of this technique.
Keywords :
chaos; decoding; discrete cosine transforms; image coding; image recognition; image sequences; matrix algebra; message authentication; statistical distributions; watermarking; JPEG image; authentication method; chaotic sequence; compressed-domain fragile watermarking scheme; decoding process; discrete cosine transform; image content; image recognition; nonzero elements distribution density; quantized DCT; re-encoding process; tamper detection matrix; tamper distinguishing; Authentication; Chaos; Decoding; Discrete cosine transforms; Embedded computing; Image coding; Image recognition; Security; Transform coding; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications, Circuits and Systems, 2009. ICCCAS 2009. International Conference on
Conference_Location :
Milpitas, CA
Print_ISBN :
978-1-4244-4886-9
Electronic_ISBN :
978-1-4244-4888-3
Type :
conf
DOI :
10.1109/ICCCAS.2009.5250463
Filename :
5250463
Link To Document :
بازگشت