With the wide application of multimedia data, multimedia content protection becomes urgent. Until now, various means have been reported that can be classified into several types according to their functionalities, such as data encryption, digital watermarking, or data authentication. They are used to protect multimedia data's confidentiality, ownership, and integrity, respectively. A wavelet-based multifeature semifragile multimedia authentication scheme is proposed. According to the approximation component and the energy relationship between the subbands of the detail component, global feature and local feature are both generated. Then, the global watermark and local watermark are generated from global feature and local feature, respectively. Two watermarks are then embedded into the multimedia data themselves, in the wavelet domain. Both the feature extraction and embedding processes are controlled by secret keys to improve the security of the proposed scheme. On the receiver side, the extracted watermark and the one generated from the received image are compared to determine the tampered location. A new authentication method is designed, and it is proved valid in the experiments. This authentication scheme is robust to general compression; sensitive to cutting, pasting, or modification; efficient in real-time operation; and secure for practical applications.
In this paper, a new counter-geometric attack watermarking scheme is proposed, which uses the matching of corner points that are extracted by Harris corner detector. In the process of watermark embedding, the watermark is adaptively embedded according to the HVS. In the detection process, a new matching method implements the coarse matching of the corner points and random sample consensus is used to refine the matching of the corner points. And then the parameter of affine transform is precisely estimated by the matching of corner points. Therefore, the watermark is detected based on the register of the geometrical-attack watermarked image. The experimental results are shown that this proposed scheme can not only counter geometrical attacks and signal processing but also improve the capacity of watermark embedding.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.