Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

12/03/2009
by   P. Meenakshi Devi, et al.
0

In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermarking are used. The first layer embedded in spatial domain verifies authenticity and the second layer embedded in transform domain provides reversibility. This technique utilizes selective LSB embedding and histogram characteristics of the difference images of the wavelet coefficients and modifies pixel values slightly to embed the watermark. Experimental results demonstrate that the proposed scheme can detect any modifications of the watermarked image.

READ FULL TEXT
research
02/21/2018

Reversible Image Watermarking for Health Informatics Systems Using Distortion Compensation in Wavelet Domain

Reversible image watermarking guaranties restoration of both original co...
research
10/22/2020

Selection of the optimal embedding positions of digital audio watermarking in wavelet domain

This work studied embedding positions of digital audio watermarking in w...
research
11/04/2009

Digital Image Watermarking for Arbitrarily Shaped Objects Based On SA-DWT

Many image watermarking schemes have been proposed in recent years, but ...
research
08/28/2017

Digital image splicing detection based on Markov features in QDCT and QWT domain

Image splicing detection is of fundamental importance in digital forensi...
research
02/28/2023

A study on the use of perceptual hashing to detect manipulation of embedded messages in images

Typically, metadata of images are stored in a specific data segment of t...
research
05/08/2019

Somewhat Reversible Data Hiding by Image to Image Translation

The traditional reversible data hiding technique is based on image modif...
research
05/31/2023

Off-By-One Implementation Error in J-UNIWARD

J-UNIWARD is a popular steganography method for hiding secret messages i...

Please sign up or login with your details

Forgot password? Click here to reset