当前位置: X-MOL 学术Computing › 论文详情
A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT
Computing ( IF 2.044 ) Pub Date : 2020-02-13 , DOI: 10.1007/s00607-020-00797-7
Nandhini Sivasubramanian, Gunaseelan Konganathan

A novel semi fragile watermarking technique using integer wavelet transform (IWT) and discrete cosine transform (DCT) for tamper detection and recovery to enhance enterprise multimedia security is proposed. In this paper, two types of watermark are generated which are namely the authentication watermark and recovery Watermark. The Watermarked Image is formed by embedding the authentication watermark which is generated using the proposed IWT based authentication watermark generating Technique. Next, the watermarked image is divided into 2 × 2 blocks and a 10 bit recovery watermark is generated from each of the 2 × 2 blocks using the proposed DCT based recovery watermark generation technique. The generated recovery watermark is used to form the recovery tag which is sent along with the watermarked image to the receiver. At the receiver side, the proposed tamper detection technique is used for verifying the authenticity and identifying the attacks in the watermarked image. If the manipulations are identified as malicious, then the tampered parts in the received image are recovered using the proposed tamper recovery technique. The performance of the proposed tamper detection and recovery technique was tested for different types of incidental/content preserving manipulations and various types of malicious attacks. When compared to the existing semi fragile watermarking techniques, the proposed embedding technique produced a better PSNR (Peak Signal to noise ratio) for various watermarked images. Also, the proposed tamper detection and recovery technique were able to localize the malicious attacks and subsequently recover the tampered parts when compared to the existing techniques. The increased performance of the proposed tamper detection and recovery technique was due to the usage of both Normalized Hamming Similarity (NHS) and tamper detection map in the proposed tamper detection technique to identify manipulations and due to the generation of both the authentication and recovery watermark.

更新日期:2020-02-13

 

全部期刊列表>>
物理学研究前沿热点精选期刊推荐
chemistry
《自然》编辑与您分享如何成为优质审稿人-信息流
欢迎报名注册2020量子在线大会
化学领域亟待解决的问题
材料学研究精选新
GIANT
自然职场线上招聘会
ACS ES&T Engineering
ACS ES&T Water
ACS Publications填问卷
屿渡论文,编辑服务
阿拉丁试剂right
南昌大学
王辉
南方科技大学
刘天飞
隐藏1h前已浏览文章
课题组网站
新版X-MOL期刊搜索和高级搜索功能介绍
ACS材料视界
天合科研
x-mol收录
X-MOL
苏州大学
廖矿标
深圳湾
试剂库存
down
wechat
bug