首页 | 官方网站   微博 | 高级检索  
     


Real-time image tamper localization based on fragile watermarking and Faber-Schauder wavelet
Affiliation:1. College of Information Engineering, Shanghai Maritime University, Shanghai 200135, China;2. School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, Jiangsu, China;3. School of Computer, Wuhan University, Wuhan 430072, Hubei, China;4. School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China;1. Institute of Information and Communication Engineering, Zhejiang University, Hangzhou 310027, China;2. School of Information and Electronic Engineering, Zhejiang University of Science & Technology, Hangzhou 310023, China;3. College of Science & Technology, Ningbo University, Ningbo 315211, China;1. Department of Electronic Communication and Software Engineering, Nanfang College of Sun Yat-Sen University, Guangzhou, China;2. School of Computer & Software, Nanjing University of Information Science & Technology, China;3. National Taichung University of Science and Technology, Department of Computer Science and Information Engineering, Taichung, Taiwan;1. Department of Computer Science and Engineering, Dr. B. C. Roy Engineering College, Durgapur, West Bengal 713206, India;2. Department of Computer Science and Engineering, Indian School of Mines, Dhanbad, Jharkhand 826004, India;1. Department of Computer Science, Università degli Studi di Torino, 10149 Torino, Italy;2. Information Systems Technology and Design, Singapore University of Technology and Design, 138682, Singapore
Abstract:This paper presents a real-time image tamper detection and localization based on fragile watermarking and Faber-Schauder discrete wavelet transform (FSDWT). The maximum coefficients of FSDWT are used with a logo to generate the watermark which is embedded in the least significant bit (LSB) of specified pixels of the original image. Experimental results prove the effectiveness of the proposed method through a series of attacks and affirm that the requirements of imperceptibility, fidelity, effectiveness and real-time processing are satisfied. The proposed method contains simple operations and has low complexity, hence, it is suitable for applications working on real-time.
Keywords:Authentication  Tamper localization  Fragile watermarking  Faber-Schauder wavelet  Real-time
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号