• 沒有找到結果。

A NOVEL MULTIPURPOSE IMAGE WATERMARKING SCHEME BASED ON BLOCK-RELATION

N/A
N/A
Protected

Academic year: 2021

Share "A NOVEL MULTIPURPOSE IMAGE WATERMARKING SCHEME BASED ON BLOCK-RELATION"

Copied!
1
0
0

加載中.... (立即查看全文)

全文

(1)

International Journal of Innovative

Computing, Information and Control ICIC International c°2007 ISSN 1349-4198

Volume 3, Number 5, October 2007 pp. 1161—1172

A NOVEL MULTIPURPOSE IMAGE WATERMARKING SCHEME BASED ON BLOCK-RELATION

Da-Jinn Wang

Department of Information Management National Kaohsiung Marine University

142, Hai-Chuan Rd. Nan-Tzu, Kaohsiung 811, Taiwan wangdaj@mail.nkmu.edu.tw

Tsong-Yi Chen, Thou-Ho (Chao-Ho) Chen and Shang-Wei Lin

Department of Electronic Engineering National Kaohsiung University of Applied Sciences

415, Cheng-Kung Road, Kaohsiung 807, Taiwan { chentso; thouho; 1094320140 }@cc.kuas.edu.tw

Received October 2006; revised February 2007

Abstract. In this paper, we propose a new scheme that uses block-related index and three types of coefficient-scan strategy in image authenticating and recovering. Block-related authenticating information makes the feature codes tolerant in compression pro-cesses. Besides, a block-classification method is used for classifying blocks into flat, vertical-detailed or horizontal-detailed types. With that, a useful coefficient-scan strategy is chosen for preserving and recovering block information. As the experimental results, the watermarked image can provide a PSNR higher than 40.00dB and can mark and recover the blocks which could be maliciously tampered with.

Keywords: Watermarking, Image authentication, Image restoration, Image compres-sion

1. Introduction. More and more watermarking approaches have been proposed for tam-per detection and copyright protection. The reproduction of a digital media element is simple and robust. How to protect and prove the original copies or tampered is an im-portant issue. In the past, several techniques and concepts, such as fragile watermarks, semi-fragile watermarks, and robust watermarks, based on data hiding or stenography have been introduced for tamper detection in digital images and for image authentica-tion.

The fragile watermark is embedded with very low robustness. Therefore, this type of watermark can be destroyed even by the slightest manipulations and thus it is comparable to the hidden message in steganography methods. It can be used to check the situation of the integrity of objects. Neither the fragile nor robust watermarks deal with the information preserving very well. Semi-fragile watermarks are marginally robust and are less sensitive to pixel modifications. So, it is possible to use them for quantifying shuffling from malicious changes, such as feature adding and removal. The primary applications of a semi-fragile watermarking system resemble those of fragile watermarking systems.

參考文獻

相關文件

² Stable kernel in a goals hierarchy is used as a basis for establishing the architecture; Goals are organized to form several alternatives based on the types of goals and

Laser Capture Microdissection Microdissection of Fluorescently of Fluorescently Labeled Embryonic Cranial Neural Crest Cells Labeled Embryonic Cranial Neural Crest Cells..

Then they work in groups of four to design a questionnaire on diets and eating habits based on the information they have collected from the internet and in Part A, and with

In this paper, we build a new class of neural networks based on the smoothing method for NCP introduced by Haddou and Maheux [18] using some family F of smoothing functions.

Based on the reformulation, a semi-smooth Levenberg–Marquardt method was developed, and the superlinear (quadratic) rate of convergence was established under the strict

Schools participating in the Pilot Scheme on Promoting Interflows between Sister Schools in Hong Kong and the Mainland (the “Pilot Scheme”) have been organising various

• Use table to create a table for column-oriented or tabular data that is often stored as columns in a spreadsheet.. • Use detectImportOptions to create import options based on

In this chapter, the results for each research question based on the data analysis were presented and discussed, including (a) the selection criteria on evaluating