IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 10    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 10, October 2011 Edition
Performance Comparison of Semifragile Watermarking Methods for Image Au-thentication
Full Text(PDF, 3000)  PP.  
Author(s)
Archana Tiwari , Dr. Manisha Sharma
KEYWORDS
semi-fragile watermarking, PSNR, Robustness, Tamper detection
ABSTRACT
Data authentication is one of the primary requisites in present day communication systems. In image processing, data authentication is implemented by using watermarking techniques. The specific interest in semifragile watermarking algorithms arises from the multitude of practical and commercial applications, where content needs to be strictly protected, but the exact representation during exchange and storage need not be guaranteed. The alterations on the documents can occur unintentionally or can be implanted intentionally. Semifragile watermarks are more robust and less sensitive to classical user modifications such as JPEG compression, content-preserving operations and content altering manipulations while sensitive to content integrity verification. In present paper the performance of seven semifragile watermarking methods are compared in terms of their PSNR, robustness and temper sensitivity properties.
References
[1] R. G. Van Schyndel, A. Z. Tirkel and C. F. Osborne, “A Digital Watermark”, In Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp 86-90, 1994.

[2] I. J. Cox, Matt Miller, “Electronic Watermarking The First 50 years”, In Proceeding of IEEE Workshop on Multimedia Signal Processing, pp. 225 – 230, 2001.

[3] Ozgur Ekici., Bulent Sankur., “Comparative Evaluation of Semi-Fragile Watermarking Algorithm”, In Journal of Electronic Imaging, Vol. 13, pp. 209-216, 2004.

[4] Tong , Zheng-ding, “The Survey of Digital Watermarking Based Image Authentication Techniques”, In Proceedings of IEEE International Conference on Signal Processing , pp. 1556-1559, 2002.

[5] Guo-rui Feng, Ling-ge Jiang, Chen He, “Permutation Based Semi-Fragile Watermark Scheme”, In Journal of IEICE Transaction Fundamentals, Vol. E88–A, pp. 375-378, 2005.

[6] Anthony T. S. Ho, Xunzhan Zhu “A Semi- Fragile Pinned Sine Transform Watermarking System for Content Authentication of Satellite Images”, In Proceeding of IEEE International Conference, pp 737-740, 2005.

[7] Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi, “Detecting Malicious Attacks Using Semi-Fragile Watermark Based on Visual Model”, In Proceeding of IEEE International Conference and Computer Society, pp 10-14, 2006.

[8] Xiaoping Liang, Weizhao Liang, Wen Zhang, “.Reversible Semi-Fragile Authentication Watermark”, In Proceeding of IEEE International Conference on Multimedia and Expo, pp 2122 - 2125, 2007.

[9] Xiaoyun Wu, “Reversible Semifragile Watermarking Based on Histogram Shifting of Integer Wavelet Coefficients”, In Proceedings of IEEE International Conference on Signal Processing, pp. 501 – 505, 2007.

[10] Zhu Xi'an, “ A Semi-Fragile Digital Watermarking Algorithm in Wavelet Transform Domain Based on Arnold Transform”, In Proceedings of IEEE International Conference on Signal Processing, pp.2217, 2008.

[11] Chang Min Hwang, Ching Yu Yang, P Yen Chang, Wu-Chih Hu, “A Semifragile Reversible Data Hiding by Coefficient Bias Algorithm”, In Proceedingsf IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Vol.1, pp. 132 –139, 2009.

[12] D. Zou, Y. Q. Shi, Z. Ni, and W. Su, “A Semi- Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform,”, In Journal of IEEE on Circuits and Systems for Video Technology, Vol. 16, pp. 1294-1300, 2006.

[13] Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding” In Journal of IEEE on Circuits and Systems for Video Technology, Vol. 16, pp. 354-361, 2006.

Untitled Page