We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439--446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and
Probability-based tampering detection scheme for digital images
โ Scribed by Ching-Sheng Hsu; Shu-Fen Tu
- Publisher
- Elsevier Science
- Year
- 2010
- Tongue
- English
- Weight
- 522 KB
- Volume
- 283
- Category
- Article
- ISSN
- 0030-4018
No coin nor oath required. For personal study only.
โฆ Synopsis
In recent years, digital watermarking technology has been widely used for property rights protection and integrity authentication of digital images. Image integrity authentication is usually done by a fragile watermarking scheme. When authenticating image integrity, one must extract the embedded authentication message from the image for comparison with the image feature to identify whether the image has been tampered with, and if so, locate the affected area. However, such authentication schemes may result in detection error problems. Namely, the tampered area may be misjudged as not having been tampered with, or vice versa. Hence, methods that effectively reduce errors in tampering detection have become an important research topic. This study aims to integrate a probability theory to improve image tampering detection accuracy and precision. The scheme includes two processes: the embedding of an image authentication message and tampering detection. In the image tampering detection process, in addition to identifying whether the image has been tampered with and locating the tampered area, through the authentication message embedded in the image, a probability theory is employed to improve previously obtained detection results to enhance authentication accuracy. The experimental results reveal that the proposed scheme performs well in terms of detection precision and authentication accuracy rate.
๐ SIMILAR VOLUMES
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and dete
## An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images A n adaptive two-stage edge detection scheme for digital color images is proposed in this paper. In the first stage of this scheme, each three-dimensional color image is reduced to a one-dimensional gray-level image using the
In this paper, we present a digital image watermarking scheme that uses both human visual system and statistical properties. The scheme places watermark in discrete cosine transform (DCT) domain and spreads the watermark eect on the entire image. We have compared our proposed scheme with two other p