Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm

Soo-Chang Pei, Yi-Chong Zeng
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
We propose a novel semi-fragile multiple-watermarking algorithm based on quantization index modulation. This algorithm utilizes two quantization steps to yield the non-uniform intervals in the real-number axis. Each interval corresponds to one binary symbol, includes stable-zero (S 0 ), unstable-zero (U 0 ), stable-one (S 1 ), and unstable-one (U 1 ). In addition, visual cryptography is integrated with the watermarking algorithm to increase the watermark capacity. Therefore, the host image is
more » ... bedded the multiple watermarks, and then we extract the watermarks from the corrupted image. According to the extracted watermarks, the algorithm achieves the tamper proofing and attack identification. From the experimental result, it shows single and multiple tampered areas are detected and demonstrates that the amount of test images will not influence the accuracy of attack identification.
doi:10.1145/1128817.1128843 dblp:conf/ccs/PeiZ06 fatcat:ukn4jqyhwrfldfvokcoq3g4uzq