Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images

2012 ◽  
Vol 23 (3) ◽  
pp. 454-466 ◽  
Author(s):  
Amit Phadikar ◽  
Santi P. Maity ◽  
Mrinal Mandal
2019 ◽  
Vol 36 (2) ◽  
pp. 1311-1321
Author(s):  
Wen-Chung Kuo ◽  
Chun-Cheng Wang ◽  
Shao-Hung Kuo ◽  
Lih-Chyau Wuu
Keyword(s):  

2014 ◽  
Vol 6 (4) ◽  
pp. 1-13 ◽  
Author(s):  
Qi Tang ◽  
Guoli Ma ◽  
Weiming Zhang ◽  
Nenghai Yu

As the blueprint of vital activities of most living things on earth, DNA has important status and must be protected perfectly. And in current DNA databases, each sequence is stored with several notes that help to describe that sequence. However, these notes have no contribution to the protection of sequences. In this paper, the authors propose a reversible data hiding method for DNA sequences, which could be used either to embed sequence-related annotations, or to detect and restore tampers. When embedding sequence annotations, the methods works in low embedding rate mode. Only several bits of annotations are embedded. When used for tamper detection and tamper restoration, all possible embedding positions are utilized to assure the maximum restoration capacity.


2014 ◽  
Vol 6 (3) ◽  
pp. 30-46
Author(s):  
Jia-Hong Li ◽  
Tzung-Her Chen ◽  
Wei-Bin Lee

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.


2018 ◽  
Vol 5 (2) ◽  
pp. 69-94
Author(s):  
K R Chetan ◽  
S Nirmala

A novel adaptive semi-fragile watermarking scheme for tamper detection and recovery of digital images is proposed in this paper. This scheme involves embedding of content and chroma watermarks generated from the first level Discrete Curvelet Transform (DCLT) coarse coefficients. Embedding is performed by quantizing the first level coarse DCLT coefficients of the input image and amount of quantization is intelligently decided based on the energy contribution of the coefficients. During watermark extraction, a tampered matrix is generated by comparing the feature similarity index value between each block of extracted and generated watermarks. The tampered objects are subsequently identified and an intelligent report is formed based on their severity classes. The recovery of the tampered objects is performed using the generated DCLT coefficients from luminance and chrominance components of the watermarked image. Results reveal that the proposed method outperforms existing method in terms of tamper detection and recovery of digital images.


2012 ◽  
Vol 62 (1) ◽  
pp. 11-18 ◽  
Author(s):  
Babloo Saha ◽  
Shuchi Sharma

2017 ◽  
Vol 67 (5) ◽  
pp. 551 ◽  
Author(s):  
Kunjan Pathak ◽  
Manu Bansal

<p>Steganography differs from other data hiding techniques because it encodes secret message inside cover object in such a way that transmission of secret message also remains a secret. Widespread usage of digital images, lower computational complexity and better performance makes spatial domain steganographic algorithms well suited for hardware implementation, which are not very frequent. This work tries to implement a modern steganalysis resistant LSB algorithm on FPGA based hardware. The presented work also optimises various operations and elements from original one third probability algorithm with respect to hardware implementation. The target FPGA for the implementation is Xilinx SP605 board (Spartan 6 series XC6SLX45T FPGA). Stego images obtained by the implementation have been thoroughly examined for various qualitative and quantitative aspects, which are found to be at par with original algorithm.</p>


Sign in / Sign up

Export Citation Format

Share Document