By Topic

A Secure Hierarchical Fragile Watermarking Method with Tamper Localization

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Xianhai Zhang ; Sch. of Comput. Sci. & Technol., Harbin Eng. Univ. ; Yongtian Yang ; Yan Zhu

Several image authentication schemes are either vulnerable to attacks or sacrifice localization accuracy to improve security. In this paper, we proposed a scheme that not only thwarts all kinds of attacks such as vector quantization (VQ) and oracle attack in order to satisfy the security but also ensures superior accuracy of tamper localization. It is effective because the detection is based on a hierarchical structure so that the accuracy of tamper localization can be ensured. That is, if a tampered pixel is not detected in level-4, it will be detected in level 3, level 2 or level 1 with a probability of nearly 1. The method can detect any tampered pixel and the size of 2times2 pixel block with a missing rate less than 0.78% and 0.19% respectively, and the missing rate of more than or equal the size of 4times4 pixel block is approximately close to 0. Experimental results demonstrate that the proposed scheme is highly sensitive to intentional tampering and the embedding watermarking is imperceptive

Published in:

Computer and Computational Sciences, 2006. IMSCCS '06. First International Multi-Symposiums on  (Volume:2 )

Date of Conference:

20-24 June 2006