Cart (Loading....) | Create Account
Close category search window
 

Chaotic watermarking scheme for authentication of JPEG Images

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Hongxia Wang ; Sch. of Inf. Sci. & Technol., Southwest Jiaotong Univ., Chengdu ; Ke Ding ; Changxing Liao

-With developing of computer networks and digital techniques, the electronic image are easily created, edited, reproduced and distributed. Unfortunately, illegal copy and malicious tamper are also facilitated. At present, fragile watermark is researched greatly to authenticate the veracity and integrity of electronic contents. In this paper, a chaotic watermarking scheme for authentication of popular JPEG images is proposed. The quantized DCT ( Discrete Cosine Transform ) coefficients after entropy decoding are mapped to the initial values of the chaotic system, then the generated watermark information by chaotic iteration is embedded into JPEG compressed domain. Thanks to the high sensitivity on initial values of the chaotic mapping, the very accurate localization is realized for the malicious tampers to JPEG images. Because we directly modify the DCT coefficients after quantization for embedding the watermark, the proposed method can prevent the invalidation of tamper detection by JPEG re-quantization. Furthermore, because the proposed scheme avoids a large of computation on full decoding and re-encoding process, the low complexity and a high extracting speed are obtained. Simulation results show the proposed scheme can directly localize the tampers happened on the watermarked JPEG images. Furthermore, the ability of tamper localization is very sensitivity. So the proposed scheme is very fit for the integrity authentication of the electronic image in Internet.

Published in:

Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on

Date of Conference:

23-24 April 2008

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.