A Survey of Semi-fragile Watermarking Authentication
In order to improve security and detection of tampered area, in the meantime be able to resist common image processing operation such as: JPEG, Gaussian Filter or other compression techniques, semi-fragile watermarking technology are considered to be the solution. This paper investigate four different kinds of semi-fragile watermarking method based upon discrete wavelet transformation (DWT), discrete cosine transformation (DCT) and vector quantization (VQ) in image authentication. Four methods will be analyzed in different aspects, including the characteristic of methods, comparison of image quality and false detection rate.
KeywordsImage authentication Semi-fragile watermarking Tamper detection
This research was partially supported by the Ministry of Science and Technology of the Republic of China under the Grants MOST 106-2221-E-324-006-MY2.
- 6.Zhang, J., Tian, L., Tai, H.M.: A new watermarking method based on chaotic maps. In: 2004 IEEE International Conference on Multimedia and Expo, ICME 2004 (2004)Google Scholar