Toral fragile watermarking for localizing and recovering tampered image

F. H. Yeh*, G. C. Lee

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In this paper, we present a novel fragile watermarking technique that can localize tampered areas and recover them by using embedded watermarks which composes of JPEG compressed data. To resist counterfeit attacks, the relation between blocks is built by toral automorphism based on the asymmetric key structure. Our experiments show that the proposed scheme can correctly identify and remedy tampered areas to the extent of JPEG compression quality, and the counterfeit attack is eliminated successfully.

Original languageEnglish
Title of host publicationProceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005
PublisherIEEE Computer Society
Pages321-324
Number of pages4
ISBN (Print)0780392663, 9780780392663
DOIs
Publication statusPublished - 2005
Event2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005 - Hong Kong, China
Duration: 2005 Dec 132005 Dec 16

Publication series

NameProceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005
Volume2005

Other

Other2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005
Country/TerritoryChina
CityHong Kong
Period2005/12/132005/12/16

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Toral fragile watermarking for localizing and recovering tampered image'. Together they form a unique fingerprint.

Cite this