Toral fragile watermarking for localizing and recovering tampered image

F. H. Yeh, G. C. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In this paper, we present a novel fragile watermarking technique that can localize tampered areas and recover them by using embedded watermarks which composes of JPEG compressed data. To resist counterfeit attacks, the relation between blocks is built by toral automorphism based on the asymmetric key structure. Our experiments show that the proposed scheme can correctly identify and remedy tampered areas to the extent of JPEG compression quality, and the counterfeit attack is eliminated successfully.

Original languageEnglish
Title of host publicationProceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005
Pages321-324
Number of pages4
Volume2005
Publication statusPublished - 2005
Event2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005 - Hong Kong, China
Duration: 2005 Dec 132005 Dec 16

Other

Other2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005
CountryChina
CityHong Kong
Period05/12/1305/12/16

Fingerprint

Watermarking
Experiments

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Yeh, F. H., & Lee, G. C. (2005). Toral fragile watermarking for localizing and recovering tampered image. In Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005 (Vol. 2005, pp. 321-324). [1595411]

Toral fragile watermarking for localizing and recovering tampered image. / Yeh, F. H.; Lee, G. C.

Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005. Vol. 2005 2005. p. 321-324 1595411.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yeh, FH & Lee, GC 2005, Toral fragile watermarking for localizing and recovering tampered image. in Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005. vol. 2005, 1595411, pp. 321-324, 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005, Hong Kong, China, 05/12/13.
Yeh FH, Lee GC. Toral fragile watermarking for localizing and recovering tampered image. In Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005. Vol. 2005. 2005. p. 321-324. 1595411
Yeh, F. H. ; Lee, G. C. / Toral fragile watermarking for localizing and recovering tampered image. Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005. Vol. 2005 2005. pp. 321-324
@inproceedings{da18f7e65929423aa4ea85ada1f8f82d,
title = "Toral fragile watermarking for localizing and recovering tampered image",
abstract = "In this paper, we present a novel fragile watermarking technique that can localize tampered areas and recover them by using embedded watermarks which composes of JPEG compressed data. To resist counterfeit attacks, the relation between blocks is built by toral automorphism based on the asymmetric key structure. Our experiments show that the proposed scheme can correctly identify and remedy tampered areas to the extent of JPEG compression quality, and the counterfeit attack is eliminated successfully.",
author = "Yeh, {F. H.} and Lee, {G. C.}",
year = "2005",
language = "English",
isbn = "0780392663",
volume = "2005",
pages = "321--324",
booktitle = "Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005",

}

TY - GEN

T1 - Toral fragile watermarking for localizing and recovering tampered image

AU - Yeh, F. H.

AU - Lee, G. C.

PY - 2005

Y1 - 2005

N2 - In this paper, we present a novel fragile watermarking technique that can localize tampered areas and recover them by using embedded watermarks which composes of JPEG compressed data. To resist counterfeit attacks, the relation between blocks is built by toral automorphism based on the asymmetric key structure. Our experiments show that the proposed scheme can correctly identify and remedy tampered areas to the extent of JPEG compression quality, and the counterfeit attack is eliminated successfully.

AB - In this paper, we present a novel fragile watermarking technique that can localize tampered areas and recover them by using embedded watermarks which composes of JPEG compressed data. To resist counterfeit attacks, the relation between blocks is built by toral automorphism based on the asymmetric key structure. Our experiments show that the proposed scheme can correctly identify and remedy tampered areas to the extent of JPEG compression quality, and the counterfeit attack is eliminated successfully.

UR - http://www.scopus.com/inward/record.url?scp=33847206813&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33847206813&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33847206813

SN - 0780392663

SN - 9780780392663

VL - 2005

SP - 321

EP - 324

BT - Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005

ER -