By Topic

Image authentication using content based watermark

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Hongmei Liu ; Dept. of Electron. & Commun., Sun Yat-Sen Univ., Guangzhou, China ; Junlong Lin ; Jiwu Huang

We propose a content based semi-fragile watermarking algorithm for image authentication. Zernike moments of the lowpass wavelet band of the host image are chosen as features. Experimental results show that Zernike moments have semi-fragile characteristics, that is, it is possible to tell whether the processing on the image is malicious or not. In order to tell where the image is changed, we also propose a structured embedding method for the quantized Zernike moments in the DWT (discrete wavelet transform) domain. Experimental results show that this method can locate the malicious tamper locally, the unit detection region is a 16×16 block, while being highly robust to content preserved processing, such as JPEG compression, Q≥50, and noise. Experiments on Stirmark also show that JPEG50-100, scale or ratio can be classified as non-malicious attacks, while jitter and cropping are malicious attacks.

Published in:

Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on

Date of Conference:

23-26 May 2005