Cart (Loading....) | Create Account
Close category search window

Tamper detection and self-recovery algorithm of color image based on robust embedding of dual visual watermarks using DWT-SVD

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Na Wang ; Chosun Univ., Gwangju, South Korea ; Chung-Hwa Kim

In this paper, we propose a scheme can be divided into two parts: one is about robust embedding of dual visual watermarks using DWT and Singular Value Decomposition (SVD), the other part is about tamper detection and self-recovery algorithm of color image. We stress on the latter part. Dual visual watermarks are original image watermark which is color scale image the same as original image and ownership watermark which is gray scale image, respectively. Both of them are embedded into original image using DWT-SVD to prove robustness. For recovery signal embedding, luminance signal and chrominance signal of original image were embedded into surplus chrominance space of original image using matrix transpose replacement embedding method. For watermark extraction scheme: firstly, threshold value would be set to find tampered region. Then we extract the recovery signals to construct recovery information. Lastly we replace tampered regions with recovery information based on threshold value. We can extract the original image watermark and ownership watermark from recovery image. Experiment demonstrates that the proposed scheme is robust to a wide range of attacks and is good at tampered detection as well as self-recovery of tampered images.

Published in:

Communications and Information Technology, 2009. ISCIT 2009. 9th International Symposium on

Date of Conference:

28-30 Sept. 2009

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.