A wavelet-based semi-fragile watermarking with recovery mechanism

Min-Jen Tsai*, Chih Cheng Chien

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

This paper studied the wavelet transformation based watermarking tamper detection and recovery scheme. By the property of discrete wavelet transform, we design the semi-fragile watermark from low-frequency band and embedding the watermark into the high-frequency band by the help of Human Visual System (HVS). The watermarked image still preserves high image quality after the embedding of the semi-fragile watermark and the image authentication system is able to locate precisely any malicious alteration made to the image. Our novel design can restore the altered or destroyed regions from the attacked images and allow the users to know what the original content was in the manipulated areas. We also analyze the robustness for mild modification like JPEG compression and channel additive white Gaussian noise (AWGN) and fragility to malicious attack. In summary, this scheme can resist the mild modifications of digital image and be able to detect the malicious modifications precisely.

Original languageEnglish
Title of host publication2008 IEEE International Symposium on Circuits and Systems, ISCAS 2008
Pages3033-3036
Number of pages4
DOIs
StatePublished - 19 Sep 2008
Event2008 IEEE International Symposium on Circuits and Systems, ISCAS 2008 - Seattle, WA, United States
Duration: 18 May 200821 May 2008

Publication series

NameProceedings - IEEE International Symposium on Circuits and Systems
ISSN (Print)0271-4310

Conference

Conference2008 IEEE International Symposium on Circuits and Systems, ISCAS 2008
CountryUnited States
CitySeattle, WA
Period18/05/0821/05/08

Keywords

  • Semi-fragile
  • Tamper detection
  • Tamper recovery copyright protection
  • Wavelet

Fingerprint Dive into the research topics of 'A wavelet-based semi-fragile watermarking with recovery mechanism'. Together they form a unique fingerprint.

Cite this