Dual Watermarking for Handwritten Document Image Authentication and Copyright Protection for JPEG Compression Attacks

Author(s):  
Ernesto Avila-Domenech ◽  
Anier Soria-Lorente ◽  
Alberto Taboada-Crispi
2020 ◽  
Vol 6 (3) ◽  
pp. 92-99
Author(s):  
A. Zhuvikin

One of the most promising application of the digital watermarking is the selective image authentication (SIA) systems. In order to implement such a system one requires an embedding algorithm with an appropriate capacity. In addition, an embedding method is to be robust for the class of non-malicious manipulations which the SIA system is designed for. We propose the new method which has a significant embedding capacity while still being tolerant to JPEG compression, brightness and contrast adjustments. This was possible due to the extension of the well-known discrete wavelet transform embedding technique. We propose two-step embedding scheme and the use of image histogram equalisation and recovering operations. The experiment results show acceptable tolerance to JPEG compression, brightness and contrast adjustments with good visual quality in terms of PSNR just after embedding.


Author(s):  
Xi Zhao ◽  
Anthony T.S. Ho ◽  
Yun Q. Shi

In the past few years, semi-fragile watermarking has become increasingly important to verify the content of images and localise the tampered areas, while tolerating some non-malicious manipulations. In the literature, the majority of semi-fragile algorithms have applied a predetermined threshold to tolerate errors caused by JPEG compression. However, this predetermined threshold is typically fixed and cannot be easily adapted to different amounts of errors caused by unknown JPEG compression at different quality factors (QFs). In this paper, the authors analyse the relationship between QF and threshold, and propose the use of generalised Benford’s Law as an image forensics technique for semi-fragile watermarking. The results show an overall average QF correct detection rate of approximately 99%, when 5%, 20% and 30% of the pixels are subjected to image content tampering and compression using different QFs (ranging from 95 to 65). In addition, the authors applied different image enhancement techniques to these test images. The proposed image forensics method can adaptively adjust the threshold for images based on the estimated QF, improving accuracy rates in authenticating and localising the tampered regions for semi-fragile watermarking.


Author(s):  
Asra Kamili ◽  
Nasir N. Hurrah ◽  
Shabir Ahamd Parah ◽  
G.M Bhat ◽  
Khan Muhammad

Sign in / Sign up

Export Citation Format

Share Document