Tamper localization of the medical images based on fragile watermarking

Author(s):  
Arda Ustubioglu ◽  
Guzin Ulutas ◽  
Beste Ustubioglu
2021 ◽  
pp. 749-757
Author(s):  
Shambhu Shankar Bharti ◽  
Shivendra Shivani ◽  
Sudhir Kumar Pandey ◽  
Suneeta Agarwal

2020 ◽  
Vol 30 (3) ◽  
pp. 177-192
Author(s):  
Muhammad Tahir Naseem ◽  
Ijaz Mansoor Qureshi ◽  
Atta-ur-Rahman ◽  
Muhammad Zeeshan Muzaffar

2016 ◽  
Vol 8 (1) ◽  
pp. 1-25 ◽  
Author(s):  
Nana Wang

For 2D vector maps, obtaining high tamper localization accuracy without requiring extra space is a technically challenging problem. Using an adaptive group division approach and an improved reversible data hiding approach, the author proposes a reversible fragile watermarking method for locating tampered Polylines/Polygons in 2D vector maps. In particular, the author adaptively divide the features of the vector map into groups according to a predefined threshold, calculate an authentication watermark for each group, embed the watermark using the improved reversible data hiding approach, and hide the mark of each feature into the feature itself. Since the adaptive group division method and the improved reversible data hiding method are combined in an attempt to make full use of the watermark embedding space, superior tamper localization accuracy and original content recovery can be ensured. Besides, no extra space is required by hiding the mark of each feature. Experimental results have been provided to demonstrate the effectiveness of our method.


2013 ◽  
Vol 401-403 ◽  
pp. 1772-1775
Author(s):  
Hui Fen Huang

For existing airspace fragile authentication watermarking algorithm positioning accuracy and security issues, this paper presents a fully-fragile watermarking based on chaos for the integrity of the image content authentication and tamper localization. The algorithm uses the original image block, the calculation of each pixel in the image block high-bit gray value as the image feature watermark information. The chaotic sequence is encrypted and determines the position of the watermark bit is embedded watermark information, tampering with the positioning accuracy of an image block of 2 × 2 pixels. Experimental results show that the algorithm is simple, safe, with good practice.


The watermarking scheme in digital media communication has become an essential tool in helping content creators prove ownership if any dispute arises in copyright infringement. In this paper, Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is performed in the watermarking process which improves the authentication of the image and the detection of the tampered region. The semi-fragile watermarking scheme provides robustness to the watermark during extraction process even after the unintentional compression attacks like JPEG compression. The watermark payload is significantly lowered in order to increase the quality of the image. The recovery is done using the absolute moment block truncation coding (AMBTC) of the image in the untampered region. Thus, both the mean and first absolute moment are used in recovering the tampered regions in the watermarked image.


Sign in / Sign up

Export Citation Format

Share Document