A multiple watermarks algorithm for image content authentication

Li-jun Cai , Rui Li , Ye-qing Yi

Journal of Central South University ›› 2012, Vol. 19 ›› Issue (10) : 2866 -2874.

PDF
Journal of Central South University ›› 2012, Vol. 19 ›› Issue (10) : 2866 -2874. DOI: 10.1007/s11771-012-1353-2
Article

A multiple watermarks algorithm for image content authentication

Author information +
History +
PDF

Abstract

A novel multiple watermarks cooperative authentication algorithm was presented for image contents authentication. This algorithm is able to extract multiple features from the image wavelet domain, which is based on that the t watermarks are generated. Moreover, a new watermark embedding method, using the space geometric model, was proposed, in order to effectively tackle with the mutual influences problem among t watermarks. Specifically, the incidental tampering location, the classification of intentional content tampering and the incidental modification can be achieved via mutual cooperation of the t watermarks. Both the theoretical analysis and simulations results validate the feasibility and efficacy of the proposed algorithm.

Keywords

multiple watermarks / cooperation authentication / wavelet transform / image wavelet domain / intentional content tampering / incidental modification

Cite this article

Download citation ▾
Li-jun Cai, Rui Li, Ye-qing Yi. A multiple watermarks algorithm for image content authentication. Journal of Central South University, 2012, 19(10): 2866-2874 DOI:10.1007/s11771-012-1353-2

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

MintzerF., BraudawayG. W.. If one watermark is good, are more better [C]. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing, 1999Kobe, JapanIEEE Press2067-2070

[2]

BadranE. F., SharkasM. A., AttallahO. A.. Multiple watermark embedding scheme in wavelet-spatial domains based on ROI of medical images [C]. National Radio Science Conference (NRSC 2009), 2009CairoIEEE Press1-8

[3]

CoxI. J., MillerM. L.Digital watermarking [M], 2002New YorkAcademic Press248-253

[4]

StankovicS., DjurovicI., PitasI.. Watermarking in the space/spatial frequency domain using two-dimensional Radon-Wigner distribution [J]. IEEE Transactions Image Processing, 2001, 10(4): 650-658

[5]

LieW. N., LinG. N., WuC. L., WangT. C.. Robust image watermarking on the DCT domain [C]. Proc IEEE Int Symp Circuits and Systems, 2000GenevaIEEE Press228-231

[6]

PeterH. W., OscarC. A., YeungY. M.. A novel blind multiple watermarking technique for images [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003, 8(13): 813-830

[7]

HsuC. T., WuJ. L.. Hidden digital watermarks in images [J]. IEEE Transactions on Image Processing, 1999, 8(1): 58-68

[8]

JiZ., XiaoW. W., WangJ. H., ZhangJ. H.. A multiple watermarking algorithm for digital image based on chaotic sequences [J]. Chinese Journal of Computers, 2003, 11(26): 1555-1561

[9]

BoatoG., De NataleF. G. B., FontanariC.. Digital image tracing by sequential multiple watermarking [J]. IEEE Transactions on Multimedia, 2007, 9(4): 677-686

[10]

MohamedA., Abou-SoudM. A., DiabM. S.. Implementation of fast digital watermarking techniques [C]. International Conference on Computer Engineering & Systems, 2008CairoIEEE Press419-426

[11]

JinC., SuT., PanL. G.. Multiple digital watermarking scheme based on ICA [C]. Image Analysis for Multimedia Interactive Services (WlAMIS’07), 2007SantoriniIEEE Press70-76

[12]

Jeng-shyangP., Hsiang-chehH., Feng-hsingWang.. A VQ-based robust multi-watermarking algorithm [C]. Proceedings 2002 IEEE Region Conference on Computers, Communications, Control and Power Engineering, 2002BeijingIEEE Press117-120

[13]

LuoH., PanJ. S., LuZ. M.. Hiding multiple watermarks in transparencies of visual cryptography [C]. Third International Conference on Intelligent Information Hiding and Multimedia signal Processing, 2007HarbinIEEE Press303-306

[14]

LaiC. C., HuangH. C., TsaiC. C.. Image watermarking scheme using singular value decomposition and micro-genetic algorithm [C]. The 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008HarbinIEEE Press469-472

[15]

NasirI., WengY., JiangJ. M.. Novel multiple spatial watermarking technique in color images [C]. 5th International Conference on Information Technology: New Generations, 2008Las VegasIEEE Press777-782

[16]

HuangW., GouJ.. An image fusion-based multi-watermarking algorithm [C]. Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control(ICNSC’06), 2006FloridaIEEE Press266-269

[17]

Hammerle-uhlJ., LiedlgruberM., UhlA., WemischH.. Multiple re-watermarking using varying wavelet packets [C]. 2008 IEEE International Conference on Multimedia and Expo, 2008HannoverIEEE Press213-216

[18]

LuC. S., MarkH. Y.. Multipurpose watermarking for image authentication and protection [J]. IEEE Trans on Image Processing, 2001, 10(10): 1579-1592

[19]

LuC. S., HsuC. Y.. Content-dependent multipurpose watermarking resistant against generalized copy attack [C]. IEEE International Conference on Multimedia and Expo (ICME), 2004TaipeiIEEE Press2039-2042

[20]

DonohoD. L.. Denoising by soft thresholding [J]. IEEE Transactions on Information Theory, 1995, 41(3): 613-627

[21]

ChangS. G., YuB., VetteriM.. Spatially adaptive wavelet thresholding with context modeling for image denosing [J]. IEEE Transactions on Image Processing, 2000, 9(10): 1522-1531

[22]

HuY.-quan.Operational research tutorial, 2003(second edition)BeijingTsinghua University Press436-446

AI Summary AI Mindmap
PDF

146

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/