Sie sind auf Seite 1von 15

Literature survey: Application of Data Hiding for Quality Access Control, Error Concealment and IPR Management of Digital

Media
Amit Phadikar Dept. of Information Technology, MCKV Institute of Engineering, Liluha, Howrah, W.B., India.

eGov Areas:
A) Key Strategic Areas: IPR Management

B) Key Technical Areas: Web Technologies and Cyber Security (Network Security, information Security) Applications Security Testing Security Intelligence and Risk Management for Secure Code Development

1. Introduction:
Now-a-days an image is synonymous to digital image and is very much essential for daily life applications such as satellite television, medical imaging (magnetic resonance imaging, ultrasound imaging, x-ray imaging), computer tomography. It is also essential for the researches in the areas of Science and Technology such as geographical information systems and astronomy. However, using the form of digital media, the art works can be duplicated and distributed without any quality degradation. The security and fair use of multimedia data, as well as fast delivery of multimedia content to a variety of end users or devices with guaranteed QoS are important yet challenging problems. Moreover, data transmission in radio mobile channel is always affected not only by the various noise of communication medium but also due to multi-path fading effect. The transmission of digital signal, such as image, over radio mobile channel may cause inevitable errors that might severely degrade the visual quality of the image. It is necessary to apply an efficient error concealment technique to compensate for any data corruption. In the following Section few related works are given.

2. Literature Survey on Access Control:


Access control is normally done through modulation of transform coefficients (like DCT, discrete wavelets transform (DWT), etc.) of the image and the video signals using some secret key. Typically two classes of techniques, namely data encryption and data hiding either separately or in combined form are used to meet the goal of access control. Grosbois et al. [1] propose a joint authentication and access control (on resolutions and qualities) technique of an image in wavelet domain that can be easily integrated in a JPEG 2000 codec. The scheme uses encrypted hash information for checking authentication. The access control in resolution level as well as in quality are achieved by adding pseudo-random noise in the high frequency subbands and by scrambling of last layer, respectively. Chang et al. [2] offer a structure to perform layered access control for scalable media. Authors pointed out that by taking advantages of both encryption and watermarking, copyrights of multimedia contents can be well protected and at the same time, multiple-grade services can be provided. Moreover, the decryption of the next layer depends on the correctness of the extracted watermark. Wu and Yu [3] propose a multi-level data embedding for access control of video. Besides user data, control information such as synchronization and the number of hidden user bits are embedded as well to achieve the goal. Pickering et al. [4] propose a blind data-hiding scheme in complex wavelet for access control of video where compliant DVD players deny access to the pirated copies of video. The watermark length is of six bits and is embedded in the high textured areas of the video frames. Authors conclude that complex wavelets can provide both shift invariance and good directional selectivity, with only a modest increase in signal redundancy and computational load. Coria et al. [5] offer a similar type of work for access control of DVD player. Yu and Yu [6, 7] describe a progressive and scalable encryption scheme that supports scalability i.e. multi-level access control of multimedia content. Authors argue that the proposed scheme is simple and flexible to support scalable multimedia communication and multimedia content access control. In [8], a reversible watermarking technique is proposed. The scheme permits different classes of consumers to gain access to different versions of an image. A pristine image is intentionally degraded in some fashion, and is distributed to consumers. Using one or more watermarks in the degraded image, some or all of the degradation can be removed, or is transformed to a less objectionable state. Through such arrangements, image consumers with different needs avail access to various images with different qualities.

Imaizumi et al. [9] offer a new private-key encryption for JPEG 2000 code streams for flexible access control of layers, resolution levels and color components. Authors pointed out that conventional access control schemes generally use several keys to control image quality. However, their work uses only one master key for both data management and delivery. At the same time, a different key generated by the master key can be delivered to the user permitted to access at different quality. Fujiyoshi et al. [10] propose a similar type of hierarchical encryption scheme for composite multimedia content that enables versatile access control. Liu et al. [11] propose a computationally efficient, secure, selective encryption scheme for JPEG 2000 images without decreasing the compressibility of the standard JPEG 2000 coding. Won et al. [12] propose a conditional access control to protect scalable video coding (SVC) bit stream using encryption method developed in the network abstraction layer (NAL). Besides this conditional access control mechanism, key management is also proposed to use SVC bit stream. Wen et al. [13] introduce a new technique of performing selective encryption and spatial/frequency shuffling of compressed MPEG-4 video content in the wireless channel. The simulation results indicate that by selective encryption and shuffling, a good trade-off can be made among complexity, security and bit rate overhead. Wang et al. [14] offer a transparent scrambling technique, where the image degradation is varied according to parameter control. Kingston et al. [15] propose a crypto-compression scheme based on a cascade of radon projection which enables fast encryption of a large amount of digital data. Standard encryption techniques, such as advanced encryption standard (AES), data encryption standard (DES), 3DES, or international data encryption algorithm (IDEA) can be applied to encrypt very small percentages of high resolution images. Zaidee et al. [16] propose two new scrambling techniques, which can be applied selectively i.e. apply either one or both. The techniques are called combined-reverse-andnormal-direction (CRND) zigzag and quantized blocks permutation (QBP) scrambling. Roche et al. [17] present a new approach based on iterated function system coding (IFSC) that provides both compression and hierarchical access control for images at various resolution levels. Kankahalli et al. [18] propose an access control scheme of video using joint light weight encryption and compression. The goal is achieved by selective bit scrambling, block shuffling and block rotation of the transformed coefficients and motion vectors. Bertino et al. [19] propose a novel approach to support multilevel access control in video databases that combines a video database indexing mechanism with a hierarchical organization of visual concepts (i.e. video

database indexing units) so that different classes of users can access different video elements (a semantic cluster, a sub cluster, a video scene, a video shot, a video frame, or even a salient object (i.e., region of interest)) or even the same video element with different quality levels according to their permissions. In [20, 21] a quality access control of gray scale image is described based on quantization index modulation (QIM) data hiding. As the scheme uses QIM, there is always quality degradation due to data embedding, even after reverse operation is done. In [22], a quality access control of DCT compressed color image is proposed based on data modulation. Similar, type of work is proposed in [23] for compressed color image in lifting domain to make the scheme compatible to JPEG 2000 codec. Both the schemes [22, 23] use data hiding for secret transmission of modulation information.

3. Literature Survey on Error Concealment:


Automatic repeat request (ARQ) and forward error control coding (FEC) are the two major error resilient approaches used by encoder or sender. However, for real-time multimedia communication through radio mobile channel, ARQ is not always feasible due to the intolerable delay in retransmission. To overcome the above problem various methods are developed for recovery of lost data in the decoder showing different tradeoff between complexity and quality. A set of error concealment techniques that do not use data hiding but provide similar high level of performance are also proposed in the literature. Those methods are pixel domain interpolation (PDI) [24], directional interpolation (DI) [25,26], projection onto convex sets (POCS) [27], block matching [28], neighborhood regions partitioned matching [29] or spectral domain methods like discreet cosine transform (DCT) [30] and discreet wavelet transform (DWT) [31] etc. Li and Orchard provide a good review of these techniques and also propose a set of block-based sequential recovery techniques [32]. The above decoder side error concealment schemes [24, 25] are mainly based on two steps. First, the decoder estimates some features of lost information like edge direction information or motion vector. Second, the decoder interpolates lost information from the estimated features in spatial, transform or temporal domains. Those methods perform well in low packet loss rate. However, they suffer from the following deficiencies: (i) fast deterioration of performance with the increase in high packet loss rate, (ii) failure in approximation of the lost blocks with considerable high-frequency content (e.g., abrupt edges), (iii) computationally expensive, (iv) not compatible with compression, and (v) leave an

objectionable amount of blockiness artifact in the output image, as they fail to approximate the texture of the recovered block. In literature, it is reported that the 1st step takes roughly 30% of total computation load. As a result, those schemes are not suitable for real time error concealment where the decoders may not have sufficient computation power or done in online. To overcome the above problem, Liu and Li [33] are the 1st authors who use data hiding as an error control tool. The scheme extracts the important information of an image, like the DC components of each (8x8) block, and embeds it into the host image to achieve the goal. Adsumilli et al. [34] propose a robust error concealment algorithm for uncompressed image using watermarking. The scheme embeds a low-resolution version of each image or video frame into itself using spread-spectrum modulation. Authors analyze various advantages and disadvantages of the full frame DCT against conventional block-based DCT embedding. Gur et al. [35] investigate an error concealment technique for uncompressed image using data hiding. The scheme embeds macro block-based best neighborhood matching (BNM) information into the original image in DWT domain. The experimental results indicate that the above error concealment technique is a promising one, especially for the erroneous channels causing a wider range of packet loss. Lin et al. [36] propose an uncompressed domain watermarking technique to restore lost blocks in the ROI. At the same time, best-neighborhood-matching (BNM) technique is used to restore lost blocks in ROB. The scheme embeds watermark using least significant bit (LSB) modulation, which is normally not secured in nature. Nayak et al. [37] propose an error concealment algorithm using watermarking where a low-resolution version of each image or video frame is embedded into itself. Experimental results indicate that the use of projection onto convex sets (POCS) together with watermarking provides better performance than the result of applying individual one. In [38], instead of promoting a new error concealment scheme, authors propose an effective utilization of the embedding spaces to provide better recovery than original schemes at the same quality degradation. Yin et al. [39] propose a data hiding that embeds edge direction information into the host image. So, the decoder needs only to perform the second step using the features (edge direction information) that are already extracted by the encoder. In addition, performing feature extraction at the encoder is more effective as the encoder usually have access to more information of the data. Though the complexity of the encoder is increased, the encoder usually has more computational resources and often can perform the tasks off-line.

The main drawback of those schemes [39] is fragile in nature, as those schemes use even-odd embedding. Wang et al. [40] propose a data hiding scheme that improves the error resiliency of objectbased video by adaptively embedding the shape and motion information into the texture data. The goal is to achieve the best video quality by minimizing total expected distortion. The optimization problem is solved using Lagrangian relaxation and dynamic programming. The prominent drawback of the scheme is low robustness (fragile) as the scheme uses even/odd embedding. Wang and Ji [41] propose a ROI based bit stream embedding. DCT bit stream of ROI is embedded into the region-of-background (ROB) wavelet coefficients. The scheme uses even-odd embedding for watermark bit insertion, which is quite fragile in nature. Carli et al. [42] propose an error concealment technique where multiple copies of the watermarks are embedded within the MPEG stream. Lie et al. [43] propose a prescription-based error concealment method. The scheme relies on pre-analyses of the concealment error image (CEI) for I-frames and the optimal error concealment scheme for P-frames at encoder side. Both the CEI and the scheme indices are considered as the prescriptions for decoder and are transmitted along with the video bit stream based on a reversible data embedding technique. Anhari et al. [44] propose a hybrid error concealment scheme. At the encoder, a linear estimation of each block of the image (from its neighboring blocks) is computed. The difference between the linear estimation and the original block is then coded and is watermarked into the image using C-JPEG, which is a hybrid of QIM watermarking and JPEG image compression. At the decoder side, whenever a lost packet is detected, the same linear estimation is computed and is used for compensation. Ylmaz et al. [45] propose a scheme similar to [39] for error concealment of compressed video data. In [46] compressed domain (DCT) error concealment scheme is proposed based on data hiding. On the other hand, Object based error concealment is proposed in [47] based on lifting and image segmentation.

4. Literature Survey on IPR Management:


Digital rights management (DRM) is the digital management of user rights to content. It links specific user rights to media in order to provide persistent governance of user activities such as viewing, duplication, and access. Ideally, a DRM system balances information protection, usability, and cost to provide a beneficial environment for all parties; this includes expanded

functionality, cost effectiveness and new marketing opportunities. Overall, management is achieved through the interaction of effective economic models, social values, legal policy, and technology. At the technological level, DRM systems incorporate encryption, copy control, tracking, conditional access, and media identification. The challenge to engineer is to developed secure systems in an environment of dynamic applications and standards for which appropriate business models and consumer expectations are only now being identified. Furthermore, controversy over the ability of DRM to create a typical licensing policy and provide more control to content vendors than traditionally accepted practices has stirred much debate on the technology. DRM is commonly done through the integration of encryption and data hiding. The goal of this chapter is to provide some research contributions in the area of DRM technologies. In this chapter, we will describe three data hiding techniques for DRM. In the following section few related work for content authentication & content-integrity verification of digital media are given.
To facilitate authentication & content-integrity verification of digital media, semi-fragile data hiding became popular over the last few years, especially in the field of cyber frauds, court evidence, & identity forgery and even in the preservation & transmission of cultural heritages [48]. Wu et al. [49] propose a

lifting based semi-fragile watermarking technique for tamper detection, which can tolerate lossy JPEG compression with as low quality as 40 percent, while locating the tampered areas accurately. Similar type of work is proposed in [50] where adaptive quantization is used for better image authentication and tamper detection. Chamlawi et al. [51] propose a lifting based semi-fragile watermarking technique where both tamper detection and recovery are done. The technique treats the lossy JPEG compression as a malicious alteration, when the quality factor is above 70. Similar types of tamper detection and recovery mechanisms are proposed in [52], although these techniques are silent about their performance on common image and signal processing operations. Qin et al. [53] propose a tamper detection mechanism for remote sensing images where the edge information found by dyadic wavelet is embedded in the cover image using wavelet packet to locate the tampered area. Yung et al. [54] propose a semi fragile watermarking technique that accepts lossy JPEG compression on the watermarked image to a pre-defined lowest quality factor and rejects crop and replacement process. Hu et al. [55] propose a semi-fragile watermarking technique for image authentication that extracts image features from the low frequency domain to generate two watermarks: one for classifying the intentional content modification and the other for indicating

the modified location. Lu et al. [56] present a novel multipurpose digital image watermarking method which can be applied for image authentication and copyright protection. In this algorithm, the robust watermark is embedded in the first stage using vector quantization. Then the semi-fragile watermark is embedded in the second stage using a novel index constrained method. The extraction of watermark is based on the product codebook. Hence, this process is very slow if one uses the full-search encoding algorithm. Moreover, the quality of the watermarked image is not high enough as the scheme uses VQ techniques.
Li [57] propose a transform-domain fragile watermarking scheme for authentication and content integrity verification of JPEG images. Author argues that high security and low computational complexity are achieved without using cryptography and hash function. Lin et al. [58] present a novel digital watermarking method for verifying the authentication of JPEG images. The image feature is generated based on the relationships of discrete cosine transfer (DCT) coefficients in the low/middle frequency domain and then embedded in the high frequency domain. Similar type of work is proposed by Lin and Chang [59] that can distinguish malicious manipulations from lossy JPEG compression regardless of the compression ratio or the number of compression iterations. Queluz [60] proposes an authentication scheme where authentication sequence is embedded via odd/even quantization of projections of column (row) triples on random bases. Note that the schemes reported in [56] are unable to recover the tampered region. Yang and Sun [61] propose an image adaptive semi-fragile watermarking scheme by taking full advantages of the masking characteristic of HVS. However, the technique is unable to detect and locate the geometric attacks.

5. References:
[1] R. Grosbois, P. Gerbelot, and T. Ebrahimi. Authentication and access control in the JPEG 2000 compressed domain. In. Proc. of the 46th SPIE Annual Meeting, Applications of Digital Image Processing, San Diego, 4472:95-104, Aug. 2001. [2] F. C. Chang, H. C. Huang, and H. M. Hang. Layered access control schemes on watermarked scalable media. Journal of VLSI Signal Processing (Springer Netherlands), 49:443-455, 2007. [3] M. Wu and H. H. Yu. Video access control via multi-level data hiding. In Proc. of the IEEE Int. Conf. on Multimedia and Expo, 1:381-384, 2000.

[4] M. Pickering, L. E. Coria, and P. Nasiopoulos. A novel blind video watermarking scheme for access control using complex wavelets. In Proc. of the IEEE Int. Conf. on Consumer Electronics, Las Vegas, pages 1-2, 2007. [5] L. Coria, P. Nasiopoulos, R. Ward, and M. Pickering. An access control video watermarking method that is robust to geometric distortions. Journal of Information Assurance and Security, 2:266-274, 2007. [6] H. H. Yu. Scalable encryption for multimedia content access control. In Proc. of the Int. Conf. on Multimedia and Expo, 2:417-420, 2003. [7] H. H. Yu and X. Yu. Progressive and scalable encryption for multimedia content access control. In Proc. of the IEEE Int. Conf. on Communications, 1:547-551, 2003. [8] J. Tian and J. Stach. Progressive image quality control using watermarking. United States Patent 20030179901, 2010. [9] S. Imaizumi, O.Watanabe, M. Fujiyoshi, and H. Kiya. Generalized hierarchical encryption of JPEG 2000 code streams for access control. In Proc. of IEEE Int. Conf. on Image Processing, Genoa, Italy, 2:1094-7, 2005. [10] M. Fujiyoshi, W. Saitou, O.Watanabe, and H. Kiya. Hierarchical encryption of multimedia contents for access control. In Proc. of the IEEE Int. Conf. on Image Processing, pages 19771980, 2006. [11] J. L. Liu. Efficient selective encryption for JPEG 2000 images using private initial table. Pattern Recognition, 39(8):509-1517, Aug. 2006. [12] Y. G. Won, T. M. Bae, and Y. M. Ro. Scalable protection and access control in full scalable video coding. Lecture Notes in Computer Science, 4283:407-421, Nov. 2006.

[13] J. G. Wen, M. Severa, W. Zeng, M. H. Luttrell, and W. Jin. A format-compliant configurable encryption framework for access control of video. IEEE Trans. on Circuits and Systems for Video Technology, 12(6):545-557, 2002. [14] C. Wang, H. B. Yu, and M. Zheng. A DCT-based MPEG-2 transparent scrambling algorithm. IEEE Trans. on Consumer Electronics, 49(4):1208-1213, 2003. [15] A. Kingston, S. Colosimo, P. Campisi, and F. Autrusseau. Lossless image compression and selective encryption using a discrete radon transform. In Proc. of the IEEE Int. Conf. on Image Processing, 4:465-468, 2007. [16] A. A. Zaidee, S. Fazdliana, and B. J. Adznan. Content access control for JPEG images using CRND zigzag scanning and QBP. In Proc. of the 6th IEEE Int. Conf. on Computer and Information Technology, Seoul, Korea, pages 146-146, 2006. [17] S. Roche, J. L. Dugelay, and R. Molva. Multi-resolution access control algorithm based on fractal coding. In Proc. of the IEEE Int. Conf. on Image Processing, 4:235-238, 1996. [18] M. S. Kankahalli and T. Guan. Compressed domain scrambler/descrambler for digital video. IEEE Trans. on Consumer Electronics, 48(2):356-365, 2002. [19] E. Bertino, J. Fan, E. Ferrari, M. S. Hacid, A. K. Elmagarmid, and X. Zhu. A hierarchical access control model for video database systems. ACM Trans. on Information System, 21(2):155-191, 2003. [20] A. Phadikar, S. P. Maity, Malay K. Kundu, Quantization based data hiding scheme for efficient quality access control of images using DWT Via Lifting, In Proc. of the 6th Indian Conference on Computer Vision, Graphics and Image Processing, IEEE Explore, India, 266-272, Dec. 2008.

10

[21] A. Phadikar, S. P. Maity, Data hiding based quality access control of digital images using adaptive QIM and lifting, Journal of Signal Processing: Image Communication, Elsevier, 26 (10): 646-661, Nov. 2011. [22] A. Phadikar, S. P. Maity, Quality access control of compressed color images, AE International Journal of Electronics and Communications, Elsevier, 64: pp. 833843, Sept. 2010. [23] A. Phadikar, S. P. Maity, ROI based quality access control of compressed color image using DWT via lifting, Electronic Letter on Computer Vision and Image Analysis (ELCVIA), Publisher Computer Vision Center / Universitat Autonoma de Barcelona, Barcelona, Spain, 8(2):51-67, July 2009. [24] B. N. Chen and Y. Lin. Hybrid error concealment using linear interpolation. In Proc. Of the Int. Symposium on Communications and Information Technologies, Bangkok, pages 926-931, 2006. [25] O. Nemethova, A. A. Moghrabi, and M. Rupp. Flexible error concealment for H.264 based on directional interpolation. In Proc. of the Int. Conf. on Wireless Networks, Communications and Mobile Computing, Maui, HI, 2:1255-1260, 2005. [26] M. Ma, O. C. Au, S. H. G. Chan, and M. T. Sun. Edge-directed error concealment. IEEE Trans. on Circuits and Systems for Video Technology, 20(3):382-395, 2009. [27] H. Sun and W. Kwok. Concealment of damaged block transform coded images using projection onto convex sets. IEEE Trans. on Image Processing, 4(4):470-477, 1995. [28] M. J. Chen, C. S. Chen, and M. C. Chi. Recursive block-matching principle for error concealment algorithm. In Proc. of Int. Symposium on Circuits and Systems, Iasi, Romania, 2:528-531, 2003.

11

[29] W. Y. F. Wong, A. K. Y. Cheng, and H. S. Horace. Concealment of damaged blocks by neighborhood regions partitioned matching. In Proc. of Int. Conf. on Image Processing, Thessaloniki, Greece, 2:45-48, 2001. [30] J. Cao, F. Li, and J. Guo. An efficient error concealment algorithm for DCT encoded images. In Proc. IEEE Canadian Conf. on Electrical and Computer Engineering, Canada, 2:753756, 2003. [31] S. D. Rane, J. Remus, and G. Sapiro. Wavelet-domain reconstruction of lost blocks in wireless image transmission and packet-switched networks. In Proc. of the Int. Conf. on Image Processing, Rochester, New York, 1:309-312, 2002. [32] X. Li and M. T. Orchard. Novel sequential error-concealment techniques using orientation adaptive interpolation. IEEE Trans. on Circuits System Video Technology, 12(10):857- 864, 2002. [33] Y. Liu and Y. Li. Error concealment for digital images using data hiding. In Proc. of the Ninth DSP Workshop, pages 1-6, 2000. [34] C. B. Adsumilli, M. C. Q. Farias, S. K. Mitra, and M. Carli. A robust error concealment technique using data hiding for image and video transmission over lossy channels. IEEE Trans. on Circuits and Systems for Video Technology, 15(11):1394-1406, 2005. [35] G. Gur, F. Alagoz, and M. AbdelHafez. A novel error concealment method for images using watermarking in error-prone channels. In Proc. of the 16th IEEE Int. Symposium on Personal, Indoor and Mobile Radio Communications, 4:2637-2641, 2005. [36] S. D. Lin, S. C. Shie, and J. W. Chen. Image error concealment based on watermarking. In Proc. 7th Digital Image Computing: Techniques and Applications, Sydney, pages 137-143, 2003.

12

[37] C. K. Nayak, M. Jayalakshmi, S. N. Merchant, and U. B. Desai. Projection onto convex sets with watermarking for error concealment. Lecture Notes in Computer Science, 4815:119-127, Nov. 2007. [38] S. D. Lin and C. W. Tsai. An effective data embedding for error concealment. In Proc. 3rd Int. Conf. on Innovative Computing Information and Control, Dalian, pages 28-32, 2008. [39] P. Yin, B. Liu, and Yu H. H. Error concealment using data hiding. In Proc. of the IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Salt Lake City, Utah, pages 1453-1456, 2001. [40] H. Wang, S. A. Tsaftaris, and A. K. Katsaggelos. Joint source-channel coding for wireless object-based video communications utilizing data hiding. IEEE Trans. on Image Processing, 15(8):2155-2169, 2006. [41] J. Wang and L. Ji. A region and data hiding based error concealment scheme for images. IEEE Trans. on Consumer Electronics, 47(2):257-262, 2001. [42] M. Carli, M. Farias, D. Bailey, and S. Mitra. Error control and concealment for video transmission using data hiding. In Proc. of the 5th Int. Symposium on Wireless Personal Multimedia Communications, 2:812-815, Oct. 2002. [43] W. N. Lie, T. C. I. Lin, D. C. Tsai, and G. S. Lin. Error resilient coding based on reversible data embedding technique for H.264/AVC video. In Proc. of the Int. Conf. on Multimedia and Expo, Amsterdam, Netherlands, pages 1174-1177, 2005. [44] A. K. Anhari, S. Sodagari, and A. N. Avanaki. Hybrid error concealment in image communication using data hiding and spatial redundancy. In Proc. Int. Conf. on Telecommunications, pages 1-5, 2008.

13

[45] A. Yylmaz and A. A. Alatan. Error concealment of video sequences by data hiding. In Proc. of the Int. Conf. on Image Processing, Barcelona, Spain, pages 679-682, 2003. [46] A. Phadikar, S. P. Maity, On protection of compressed image in fading channel using data hiding, International Journal of Computer and Electrical Engineering, Elsevier (doi:10.1016/j.compeleceng.2011.10.014). [47] A. Phadikar, S. P. Maity, ROI based error concealment of compressed object based image using QIM data hiding and wavelet transform, IEEE Transaction on Consumer Electronic, 56(2): 971-979, May 2010.
[48] O. Ekici, B. Sankur, B. Coskun, U. Naci, and M. Akcay. Comparative evaluation of semi fragile watermarking algorithms. Journal of Electronic Imaging, 13(1):209-216, 2004. [49] X. Wu, J. Hu, Z. Gu, and J. Huang. A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters. In Proc. of the Australian Workshop on Grid Computing and E-Research, New South Wales, pages 75-80, 2005. [50] C. Jin, Y. Chao, and X. L. Zhang. Semi-fragile watermark based on adaptive quantization for image content authentication. In Proc. of the Int.Conf. on E-business and Information System Security, China, pages 1-5, 2009. [51] R. Chamlawi, A. Khan, A. Idris, and Z. Munir. A secure semi-fragile watermarking scheme for authentication and recovery of images based on wavelet transform. In Proc. Of the World Academy of Science, Engineering and Technology, 17:217-220, 2006.

[52] H. B. Zhang and C. Yang. Tamper detection and self recovery of images using self embedding. Chinese Journal of Electronics, 32(2):196-199, 2004. [53] Q. Qin, W. Wang, S. Chen, D. Chen, and W. Fu. Research of digital semi-fragile watermarking of remote sensing image based on wavelet analysis. In Proc. of the IEEE Int. Symposium on Geo Science and Remote Sensing, Anchorage, Alaska, USA, 4:2542-2545, 2004.

14

[54] C. Yung and S. F. Chang. Semi-fragile watermarking for authenticating JPEG visual content. In Proc. of the SPIE Security and Watermarking of Multimedia Content, San Jose, pages 140-151, 2000. [55] Y. P. Hu and D. Z. Han. Using two semi-fragile watermark for image authentication. In Proc. of the 4th Int. Conf. on Machine Learning and Cybernetics, Guangzhou, 9:5484-5489, 2005. [56] Z. M. Lu, D. G. Xu, and S. H. Sun. Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans. on Image Processing, 14(6):822-831, 2005. [57] C. T. Li. Digital fragile watermarking scheme for authentication of JPEG images. In Proc. of the IEE on Vision, Image and Signal Processing, 151:460-466, 2004. [58] C. H. Lin, T. S. Su, and W. S. Hsieh. Semi-fragile watermarking scheme for authentication of JPEG images. Tamkang Journal of Science and Engineering, 10(1):57-66, 2007. [59] C. Y. Lin and S. F. Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. on Circuits System and Video Technology, 11(2):153-168, 2001. [60] M. P. Queluz. Spatial watermark for image content authentication. Journal of Electronic Imaging, 11(2):275-285, 2002. [61] H. Yang and X. Sun. Semi-fragile watermarking for image authentication and tamper detection using HVS model. In Proc. of the Int. Conf. on Multimedia and Ubiquitous Engineering, Seoul, pages 11121117, 2007.

15

Das könnte Ihnen auch gefallen