TY - GEN
T1 - Toral fragile watermarking for localizing and recovering tampered image
AU - Yeh, F. H.
AU - Lee, G. C.
PY - 2005
Y1 - 2005
N2 - In this paper, we present a novel fragile watermarking technique that can localize tampered areas and recover them by using embedded watermarks which composes of JPEG compressed data. To resist counterfeit attacks, the relation between blocks is built by toral automorphism based on the asymmetric key structure. Our experiments show that the proposed scheme can correctly identify and remedy tampered areas to the extent of JPEG compression quality, and the counterfeit attack is eliminated successfully.
AB - In this paper, we present a novel fragile watermarking technique that can localize tampered areas and recover them by using embedded watermarks which composes of JPEG compressed data. To resist counterfeit attacks, the relation between blocks is built by toral automorphism based on the asymmetric key structure. Our experiments show that the proposed scheme can correctly identify and remedy tampered areas to the extent of JPEG compression quality, and the counterfeit attack is eliminated successfully.
UR - http://www.scopus.com/inward/record.url?scp=33847206813&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33847206813&partnerID=8YFLogxK
U2 - 10.1109/ispacs.2005.1595411
DO - 10.1109/ispacs.2005.1595411
M3 - Conference contribution
AN - SCOPUS:33847206813
SN - 0780392663
SN - 9780780392663
T3 - Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005
SP - 321
EP - 324
BT - Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005
PB - IEEE Computer Society
T2 - 2005 International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2005
Y2 - 13 December 2005 through 16 December 2005
ER -