Cart (Loading....) | Create Account
Close category search window
 

An Image Watermarking Scheme with Tamper Detection and Recovery

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
3 Author(s)
Lin, S.D. ; Dept. of Comput. Sci. & Inf. Eng., Nat. Dong Hwa Univ., Hualien ; Yu-Chan Kuo ; Yu-Hsun Huang

In the aspect of tamper detection and recovery, there are some methods to embed the feature information in host image for recovery. When the host image has been tampered with, the feature information can be used to restore the original image. However, it does not have the ability to verify the ownership of the copyright. In this article, an image watermarking scheme with tamper detection, and recovery is proposed. The main goal is to detect and recover the tampered region accurately. In addition, the proposed method has robustness to resist the attacks of JPEG compression and cropping. This is a novel scheme because it has the functions of tamper detection and recovery, while having the main advantage of robust watermarking. Experimental results further demonstrate that our proposed technique is an efficient method to verify the ownership and recover the tampered region

Published in:

Innovative Computing, Information and Control, 2006. ICICIC '06. First International Conference on  (Volume:3 )

Date of Conference:

Aug. 30 2006-Sept. 1 2006

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.