A generalized tamper localization approach for reversible watermarking algorithms

Author(s):  
Ruchira Naskar ◽  
Rajat Subhra Chakraborty
2015 ◽  
Vol 7 (3) ◽  
pp. 60-80 ◽  
Author(s):  
Nana Wang ◽  
Xiangjun Zhao ◽  
Han Zhang

In this paper, the authors propose a block-based reversible watermarking method for 2D vector map authentication. In the scheme, they divide the features of a vector map into different categories of blocks, calculate an authentication watermark for each block, and embed the watermarks of different blocks using a reversible watermarking method based on virtual coordinates and a fragile watermarking algorithm based on concentric circles. While the block division ensures superior accuracy of tamper localization, the two watermarking methods provide recovery of the original content. Experimental results show that the proposed scheme has good invisibility, reversibility and computational complexity, and can accurately locate malicious attacks such as vertex modification/addition/deletion and feature modification/addition/deletion.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Ali Hamadou ◽  
Lanciné Camara ◽  
Abdoul Aziz Issaka Hassane ◽  
Harouna Naroua

The protection of database systems content using digital watermarking is nowadays an emerging research direction in information security. In the literature, many solutions have been proposed either for copyright protection and ownership proofing or integrity checking and tamper localization. Nevertheless, most of them are distortion embedding based as they introduce permanent errors into the cover data during the encoding process, which inevitably affect data quality and usability. Since such distortions are not tolerated in many applications, including banking, medical, and military data, reversible watermarking, primarily designed for multimedia content, has been extended to relational databases. In this article, we propose a novel prediction-error expansion based on reversible watermarking strategy, which not only detects and localizes malicious modifications but also recovers back the original data at watermark detection. The effectiveness of the proposed method is proved through rigorous theoretical analysis and detailed experiments.


The image is significantly used in applications such as medical area, research area, image conferencing, a military image system, online transactions, digital signatures, passwords etc. But not everyone who uses this network is going to play by the rules or have the best interest at heart. Just as we have physical security like locks, fences and police officers to minimize crime in the real world. We need some security to minimize crime and harm in the virtual world. Three important factors form the security objectives of the digital content: they are Availability, Confidentiality, and Integrity. Watermarking techniques along with some Cryptography are used to protect the confidentiality of data. Watermarking is basically a process of injecting data into an image in such a way that it can depict the authenticity of those possessing it. The digital information hidden inside an image is imperceptible to the user but can be easily detected by a computer or various digital devices. Watermarking Technique has proved to be a powerful technique for image security and a lot of research has been made over the years to how to embed the watermarks and recover the watermarks effectively. These types of technique where watermark can be fully extracted from the image and along with the restoration of the cover are popularly known as Reversible Watermarking techniques. These techniques have significantly gained importance due to this excellent recovering property making them suitable for content authentication based applications. However, they are not able to identify any modifications or changes done in watermark making it susceptible to tamper location-based attacks. Due to the rapid development of watermarking techniques, a concluding review of recent research in this field is highly desirable. However, the major focus of this paper is on tamper localization based reversible watermarking techniques.


2003 ◽  
Author(s):  
Michiel van der Veen ◽  
Fons Bruekers ◽  
Arno van Leest ◽  
Stephane Cavin

2021 ◽  
pp. 073168442094118
Author(s):  
Qi Wu ◽  
Hongzhou Zhai ◽  
Nobuhiro Yoshikawa ◽  
Tomotaka Ogasawara ◽  
Naoki Morita

A novel localization approach that seamlessly bridges the macro- and micro-scale models is proposed and used to model the forming-induced residual stresses within a representative volume element of a fiber reinforced composite. The approach uses a prescribed boundary that is theoretically deduced by integrating the asymptotic expansion of a composite and the equal strain transfer, thus rendering the simulation setting to be easier than conventional approaches. When the localization approach is used for the finite element analysis, the temperature and residual stresses within an ideal cubic representative volume element are precisely simulated, given a sandwiched thermoplastic composite is formed under one-side cooling condition. The simulation results, after being validated, show that the temperature gradient has an impact on the local residual stresses, especially on the in-plane normal stress transverse to the fiber, and consequently, influences the structural deformation. This newly designed localization approach demonstrates the advantages of enhanced precision and reduced computational cost owing to the fast modeling of the finely meshed representative volume element. This is beneficial for a detailed understanding of the actual residual stresses at the micro-scale.


Sign in / Sign up

Export Citation Format

Share Document