TY - GEN
T1 - A semi-fragile watermarking distinguishing JPEG compression and gray-scale-transformation from malicious manipulation
AU - Xiao, Jun
AU - Ma, Zhiqiang
AU - Lin, Bai
AU - Su, Jiaorao
AU - Wang, Ying
PY - 2010
Y1 - 2010
N2 - Semi-fragile watermarking which is robust to given operations and fragile to conscious operations, is a useful authentication technique for digital media. In this paper, a novel semi-fragile image watermarking algorithm that accepts JPEG compression and gray-scale-transformation is proposed. In the proposed algorithm, the properties of JPEG compression, DCT coefficients and gray-scale-transformation are analyzed and used to optimize the embedding parameters especially the quantization step, which can make sure of the robustness and frangibility of the algorithm to given processes and attacks. The robustness and frangibility of the proposed algorithm to given image processes are analyzed, and the results show that the proposed algorithm is very robust to JPEG compression, gray-scale-transformation, and the combination of JPEG compression and gray-scale-transformation, while it is very fragile to malicious attacks, such as cropping, adding signature and median filtering. Namely, the proposed algorithm can distinguish JPEG compression and grayscale-transformation from other attacks accurately.
AB - Semi-fragile watermarking which is robust to given operations and fragile to conscious operations, is a useful authentication technique for digital media. In this paper, a novel semi-fragile image watermarking algorithm that accepts JPEG compression and gray-scale-transformation is proposed. In the proposed algorithm, the properties of JPEG compression, DCT coefficients and gray-scale-transformation are analyzed and used to optimize the embedding parameters especially the quantization step, which can make sure of the robustness and frangibility of the algorithm to given processes and attacks. The robustness and frangibility of the proposed algorithm to given image processes are analyzed, and the results show that the proposed algorithm is very robust to JPEG compression, gray-scale-transformation, and the combination of JPEG compression and gray-scale-transformation, while it is very fragile to malicious attacks, such as cropping, adding signature and median filtering. Namely, the proposed algorithm can distinguish JPEG compression and grayscale-transformation from other attacks accurately.
KW - Grayscale-transformation
KW - JPEG compression
KW - Watermarking
UR - https://www.scopus.com/pages/publications/79952756581
U2 - 10.1109/YCICT.2010.5713080
DO - 10.1109/YCICT.2010.5713080
M3 - 会议稿件
AN - SCOPUS:79952756581
SN - 9781424488841
T3 - Proceedings - 2010 IEEE Youth Conference on Information, Computing and Telecommunications, YC-ICT 2010
SP - 202
EP - 205
BT - Proceedings - 2010 IEEE Youth Conference on Information, Computing and Telecommunications, YC-ICT 2010
T2 - 2010 IEEE Youth Conference on Information, Computing and Telecommunications, YC-ICT 2010
Y2 - 28 November 2010 through 30 November 2010
ER -