Fragile Watermarking-Based Authentication Scheme for Demosaicked Images

Chia Chen Lin, Cheng Han Lin, Xiao Long Liu, Shyan-Ming Yuan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

This paper presents a reversible fragile watermarking scheme for the authentication of demosaicked images. Each authentication code is embedded into the two rebuilt components of each color pixel by using a designed authentication table (ACT). The utilization of ACT secures the watermarking procedure and the watermarked image can be recovered back to the original demosaicked image by the proposed scheme. The proposed scheme is compared with some existing image authentication schemes, and the experimental results demonstrate that our scheme can preserve better image quality and provides superior tamper detection performance.

Original languageEnglish
Title of host publicationProceedings - 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015
EditorsJeng-Shyang Pan, Ching-Yu Yang, Hsiang-Cheh Huang, Ivan Lee
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages97-100
Number of pages4
ISBN (Electronic)9781509001880
DOIs
StatePublished - 19 Feb 2016
Event11th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015 - Adelaide, Australia
Duration: 23 Sep 201525 Sep 2015

Publication series

NameProceedings - 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015

Conference

Conference11th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2015
CountryAustralia
CityAdelaide
Period23/09/1525/09/15

Keywords

  • fragile watermarking
  • image demosaicking
  • reversible authentication table (ACT)
  • tamper detection

Fingerprint Dive into the research topics of 'Fragile Watermarking-Based Authentication Scheme for Demosaicked Images'. Together they form a unique fingerprint.

Cite this