Active Approach for Tamper Detection with Robustness to Lossy Compression
Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bit...
Saved in:
Published in | Shanghai jiao tong da xue xue bao Vol. 18; no. 4; pp. 385 - 393 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.06.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tam- pered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. ExperimentM results demonstrate the effectiveness of the proposed scheme. |
---|---|
Bibliography: | Active tamper detection using watermarking technique can localize the tampered area and recover the lost information. In this paper, we propose an approach that the watermark is robust to legitimate lossy compression, fragile to malicious tampering and capable of recovery. We embed the watermark bits in the direct current value of energy concentration transform domain coefficients. Let the original watermark bits be content dependent and apply error correction coding to them before embedded to the image. While indicating the tam- pered area, the extracted bits from a suspicious image can be further decoded and then used to roughly recover the corresponding area. We also theoretically study the image quality and bit error rate. ExperimentM results demonstrate the effectiveness of the proposed scheme. 31-1943/U LI Jian, LI Sheng-hong, ZHENG Xu-ping(1. Department of Electronic Engineering, Shanghai Jiaotong University, Shanghai 200240, China; 2. The Third Research Institute of Ministry of Public Security of P.R.C, Shanghai 200031, China) active tamper detection, energy concentration transform, error correction code, semi-fragile water- marking ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 1007-1172 1995-8188 |
DOI: | 10.1007/s12204-013-1421-2 |