[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yang et al., 2014 - Google Patents

Tampering detection and content recovery for digital images using halftone mechanism

Yang et al., 2014

Document ID
16024829576804652689
Author
Yang S
Qin C
Qian Z
Xu B
Publication year
Publication venue
2014 tenth international conference on intelligent information hiding and multimedia signal processing

External Links

Snippet

In this paper, an effective self-embedding fragile watermarking method for tampering detection and content recovery is proposed. The halftone mechanism and the extension operation are utilized to generate recovery bits from the resized original image. Watermark …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/3232Robust embedding or watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0061Embedding of the watermark in each block of the image, e.g. segmented watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0203Image watermarking whereby the image with embedded watermark is reverted to the original condition before embedding, e.g. lossless, distortion-free or invertible watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0083Image watermarking whereby only watermarked image required at decoder, e.g. source-based, blind, oblivious
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/41Bandwidth or redundancy reduction
    • H04N1/411Bandwidth or redundancy reduction for the transmission or storage or reproduction of two-tone pictures, e.g. black and white pictures
    • H04N1/4115Bandwidth or redundancy reduction for the transmission or storage or reproduction of two-tone pictures, e.g. black and white pictures involving the recognition of specific patterns, e.g. by symbol matching

Similar Documents

Publication Publication Date Title
Qin et al. Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy
Sreenivas et al. Fragile watermarking schemes for image authentication: a survey
Baluja Hiding images in plain sight: Deep steganography
Haghighi et al. TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique
Qin et al. Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode
Yang et al. Improving stego image quality in image interpolation based data hiding
Wang et al. Automatic image authentication and recovery using fractal code embedding and image inpainting
Wu et al. Robust copyright protection scheme for digital images using overlapping DCT and SVD
Qin et al. Fragile image watermarking scheme based on VQ index sharing and self-embedding
CN102103738B (en) Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks
Rajput et al. Image tamper detection and self-recovery using multiple median watermarking
Abdelhakim et al. Fragile watermarking for image tamper detection and localization with effective recovery capability using K-means clustering
Yang et al. Tampering detection and content recovery for digital images using halftone mechanism
Wu et al. A simple image tamper detection and recovery based on fragile watermark with one parity section and two restoration sections
Pal et al. A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix
Chen et al. High-capacity reversible data hiding in encrypted image based on Huffman coding and differences of high nibbles of pixels
Rakhmawati Image fragile watermarking with two authentication components for tamper detection and recovery
Lin et al. Two-layer reversible data hiding based on AMBTC image with (7, 4) Hamming code
CN111464718B (en) Encryption image reversible information hiding method based on interpolation technology
Chen et al. Reversible authentication and cross-recovery of images using (t, n)-threshold and modified-RCM watermarking
Datta et al. Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion
Luo et al. Blind image watermarking based on discrete fractional random transform and subsampling
Malik et al. A new image steganography technique based on pixel intensity and similarity in secret message
CN110417551B (en) Character and picture generation type camouflage and recovery method combined with error diffusion
Qin et al. Effective fragile watermarking for image authentication with high-quality recovery capability