๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Probability-based tampering detection scheme for digital images

โœ Scribed by Ching-Sheng Hsu; Shu-Fen Tu


Publisher
Elsevier Science
Year
2010
Tongue
English
Weight
522 KB
Volume
283
Category
Article
ISSN
0030-4018

No coin nor oath required. For personal study only.

โœฆ Synopsis


In recent years, digital watermarking technology has been widely used for property rights protection and integrity authentication of digital images. Image integrity authentication is usually done by a fragile watermarking scheme. When authenticating image integrity, one must extract the embedded authentication message from the image for comparison with the image feature to identify whether the image has been tampered with, and if so, locate the affected area. However, such authentication schemes may result in detection error problems. Namely, the tampered area may be misjudged as not having been tampered with, or vice versa. Hence, methods that effectively reduce errors in tampering detection have become an important research topic. This study aims to integrate a probability theory to improve image tampering detection accuracy and precision. The scheme includes two processes: the embedding of an image authentication message and tampering detection. In the image tampering detection process, in addition to identifying whether the image has been tampered with and locating the tampered area, through the authentication message embedded in the image, a probability theory is employed to improve previously obtained detection results to enhance authentication accuracy. The experimental results reveal that the proposed scheme performs well in terms of detection precision and authentication accuracy rate.


๐Ÿ“œ SIMILAR VOLUMES


Tampering with a watermarking-based imag
โœ Raphael C.-W. Phan ๐Ÿ“‚ Article ๐Ÿ“… 2008 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 163 KB

We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439--446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and

A watermarking-based image ownership and
โœ Chin-Chen Chang; Yih-Shin Hu; Tzu-Chuen Lu ๐Ÿ“‚ Article ๐Ÿ“… 2006 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 368 KB

Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and dete

An Adaptive Two-Stage Edge Detection Sch
โœ Piyu Tsai; Chin-Chen Chang; Yu-Chen Hu ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 689 KB

## An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images A n adaptive two-stage edge detection scheme for digital color images is proposed in this paper. In the first stage of this scheme, each three-dimensional color image is reduced to a one-dimensional gray-level image using the

SVD-based digital image watermarking sch
โœ Chin-Chen Chang; Piyu Tsai; Chia-Chen Lin ๐Ÿ“‚ Article ๐Ÿ“… 2005 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 346 KB
Perceptually tuned robust watermarking s
โœ S. Suthaharan; S.W. Kim; H.K. Lee; S. Sathananthan ๐Ÿ“‚ Article ๐Ÿ“… 2000 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 319 KB

In this paper, we present a digital image watermarking scheme that uses both human visual system and statistical properties. The scheme places watermark in discrete cosine transform (DCT) domain and spreads the watermark eect on the entire image. We have compared our proposed scheme with two other p