Font Size: a A A

Research On Image Authentication Based On Fragile Watermarking

Posted on:2012-07-06Degree:MasterType:Thesis
Country:ChinaCandidate:X DongFull Text:PDF
GTID:2248330395955501Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of the multimedia technology and the networktechnology, digital media (digital images, digital videos, digital audios, etc) have beenwidely used, while people are enjoying the fast access to information, There are alsopiracy, information out of control and other serious threats. Therefore, the informationsecurity of digital media, intellectual property protection and other issues are becomingincreasingly prominent, the integrity of multimedia information and the authenticitycertification of content are becoming increasingly important.Digital watermarking technology refers to the embedding of the copyright andauthentication information in to the multimedia data in order to identify the owner ofthe data and verify the authenticity of the data. As an important means to authenticatemultimedia message and protect copyright, digital watermarking technology has been ofgreat concern, and the range of applications becomes increasingly wide. In the field ofthe image information security,(semi) fragile watermarking techniques have hugeadvantages of the content authentication about authenticity and integrity.This paper analyzes the theory of digital watermarking technology first, discussesthe mathematical model and features of digital watermarking algorithms, the evaluationcriteria of watermark properties are also given, besides, the paper summarizes the basicmodel of image authentication system and key issues. On this basis, according to thecharacteristics of digital images and the specific requirements for image authentication,three schemes on the content authentication are proposed. Based on spatial domain, thefirst two programs are completely fragile watermarking algorithms which can restorethe image content, we can embed two kinds of digital watermarks into the image todetect tampering and recover it: location watermarking and restoration watermarking,each of the two algorithms has the advantage of the location accuracy and the imagerestoration quality; the third scheme is based on transform domain, with the study ofwavelet transform theory and the theory of singular value decomposition, we give aself-embedding image authentication algorithm based on DWT and SVD, as asemi-fragile watermarking algorithm it is robust to the JPEG compression.The experimental results show that the proposed watermarking algorithms in thispaper possess high tamper detection rate and low false alarm rate with better imagequality, these algorithms can detect and locate malicious image content tampering accurately and effectively prevent the collage attack.
Keywords/Search Tags:Image authentication, (semi) fragile watermarking, Image restoration, JPEG compression
PDF Full Text Request
Related items