tamper localization
Recently Published Documents


TOTAL DOCUMENTS

77
(FIVE YEARS 15)

H-INDEX

12
(FIVE YEARS 1)

2021 ◽  
pp. 749-757
Author(s):  
Shambhu Shankar Bharti ◽  
Shivendra Shivani ◽  
Sudhir Kumar Pandey ◽  
Suneeta Agarwal

2021 ◽  
Author(s):  
Wenjia Ding ◽  
Huyin Zhang ◽  
Ralf Reulke ◽  
Yulin Wang

Abstract In previous data hiding techniques, binary rules are usually used to guide the fine-tuning of the values of basic objects in the host media to hide bit 0 and bit 1. In this paper, we propose a new data hiding technique for gray images based on querying a 256x256 information table. The information table is constructed by cloning a 3x3 basic block, which we call seed block. Eight unsigned integer values between 0 and 7, i.e., 3 bit binary data, are assigned to different elements of the seed block. Each time, a pair of pixels are chosen from a host image, and their pixel values are used as row and column numbers to look up the information table. If element value obtained by looking up the table is equal to the 3 bit binary data to be hidden, the values of the pixel pair will remain unchanged. Otherwise, take this element as the central point, we call it the focus element, to enclose a 3x3 window in the information table. Then in the window, find the element which is equal to the data to be hidden. Finally, update the pixel values of the pair with the row and column numbers of the found element in the window. Since the row and column numbers are in the range of 0-255, the updated pixel values will not overflow. In the proposed algorithm, a pair of pixels can hide 3 bits of information, so the embedding capacity is very high. Since the adjustment of pixel values is constrained in a 3x3 window, the modification amount of pixel values is small. The proposed technique belongs to fragile digital watermarking, so it can be used for image authentication and tamper localization. By the evaluation of data hiding capacity, security, imperceptibility, computational cost and extensibility, this algorithm is superior to existing information hiding techniques. The proposed technique can also be used in color image and audio data hiding.


2020 ◽  
Vol 2020 ◽  
pp. 1-13 ◽  
Author(s):  
Shaozhang Xiao ◽  
Zhengwei Zhang ◽  
Yue Zhang ◽  
Changhui Yu

Considering the existing medical image watermarking algorithms, a single function often has limitations, and a multipurpose watermarking algorithm for medical images is proposed. First, medical images are divided into regions of interest (ROIs) and regions of noninterest (RONIs). Then, the authentication watermark produced for each subblock of the ROI is embedded into the corresponding mapping subblock. The visible watermark is embedded into the RONI, and, finally, the watermark information and constructed authentication information in each subblock of the ROI are embedded into the corresponding RONI subblock. Simulation results show that the embedded visible watermark can protect and facilitate medical image management. In addition, the proposed algorithm has strong robustness and very good visual quality. It can simultaneously realize copyright protection and content authentication and also has high tamper localization capability.


The watermarking scheme in digital media communication has become an essential tool in helping content creators prove ownership if any dispute arises in copyright infringement. In this paper, Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) is performed in the watermarking process which improves the authentication of the image and the detection of the tampered region. The semi-fragile watermarking scheme provides robustness to the watermark during extraction process even after the unintentional compression attacks like JPEG compression. The watermark payload is significantly lowered in order to increase the quality of the image. The recovery is done using the absolute moment block truncation coding (AMBTC) of the image in the untampered region. Thus, both the mean and first absolute moment are used in recovering the tampered regions in the watermarked image.


2020 ◽  
Vol 79 (29-30) ◽  
pp. 21441-21470
Author(s):  
Nasir N. Hurrah ◽  
Shabir A. Parah ◽  
Javaid A. Sheikh

2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Ali Hamadou ◽  
Lanciné Camara ◽  
Abdoul Aziz Issaka Hassane ◽  
Harouna Naroua

The protection of database systems content using digital watermarking is nowadays an emerging research direction in information security. In the literature, many solutions have been proposed either for copyright protection and ownership proofing or integrity checking and tamper localization. Nevertheless, most of them are distortion embedding based as they introduce permanent errors into the cover data during the encoding process, which inevitably affect data quality and usability. Since such distortions are not tolerated in many applications, including banking, medical, and military data, reversible watermarking, primarily designed for multimedia content, has been extended to relational databases. In this article, we propose a novel prediction-error expansion based on reversible watermarking strategy, which not only detects and localizes malicious modifications but also recovers back the original data at watermark detection. The effectiveness of the proposed method is proved through rigorous theoretical analysis and detailed experiments.


2020 ◽  
Vol 9 (4) ◽  
pp. 254
Author(s):  
Xingang Zhang ◽  
Haowen Yan ◽  
Liming Zhang ◽  
Hao Wang

Content integrity of high-resolution remote sensing (HRRS) images is the premise of its usability. Existing HRRS image integrity authentication methods are mostly binary decision-making processes, which cannot provide a further interpretable information (e.g., tamper localization, tamper type determination). Due to this reason, a robust HRRS images integrity authentication algorithm using perceptual hashing technology considering both global and local features is proposed in this paper. It extracts global features by the efficient recognition ability of Zernike moments to texture information. Meanwhile, Features from Accelerated Segment Test (FAST) key points are applied to local features construction and tamper localization. By applying the concept of multi-feature combination to the integrity authentication of HRRS images, the authentication process is more convincing in comparison to existing algorithms. Furthermore, an interpretable authentication result can be given. The experimental results show that the algorithm proposed in this paper is highly robust to the content retention operation, has a strong sensitivity to the content changing operations, and the result of tampering localization is more precise comparing with existing algorithms.


Sign in / Sign up

Export Citation Format

Share Document