logo region of interest fragile watermarking for image authentication...

16
www.themegallery.com LOGO Region of Interest Fragile Watermarking for Image Authentication 指指指指 指指指指指 指指 指指指

Upload: julie-rolfe

Post on 15-Dec-2015

249 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.comLOGO

Region of Interest Fragile Watermarking for Image

Authentication

Region of Interest Fragile Watermarking for Image

Authentication指導老師:陳炳彰老師

學生:林青照

Page 2: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

參考出處

題目:” Region of Interest Fragile Watermarking for

Image Authentication”作者: Yiping Chu, Yin Zhang, Sanyuan Zhang and Xiuzi

Ye學校: College of Computer Science, State Key Lab of

CAD&CG, Zhejiang University,來自: 2006 IEEE

Page 3: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

Abstract

1.Digital watermarking plays an important role in

image verification and copyright protection.

2. A watermarking scheme for authenticating ROI (region

of interest) of image has been proposed in the paper.

Page 4: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

1. Introduction

The watermarking schemes as mentioned above

have not reported to be able to watermark for local

image authentication and copyright protection

Page 5: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

2. Related work

2.1. Fragile watermarking Schemes1.Kundur et al. [14] present a fragile watermarking technique which embeds a watermark in the discrete wavelet domain

by quantizing the corresponding coefficients.tamper detection in localized spatial and frequency regions2. Wu et al. present a secure semi-fragile watermarking for

image authenticationbased on integer wavelet transform3. Ding et al propose a semi-fragile watermarking scheme, which is a wavelet-based chaotic semi-fragile watermarking scheme with more JPEG compression

tolerance.

Page 6: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

2. Related work

2.2. Foreground extraction

1.The GVF snake

it has two significant advantages over the traditional snake formulation.

2. Sun et al.

present a matting approach to obtain foreground from complex background by solving Poisson PDE equations.

Poisson matting and GrabCut have their respective advantages

over each other.

In the paper, we adopt Poisson matting to extract foreground.

Page 7: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

3. Proposed scheme

Fig1.(a) Diagram of watermark embedding scheme

Page 8: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

3. Proposed scheme

(b) Diagram of watermark extraction and tamper detection scheme

Page 9: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

3. Proposed scheme

3.1. Reference mask generationIn order to produce the binary reference mask image, copyright owner adopt

Poisson matting [18] to obtain the image RIM which consists of the ROI of original image as foreground and blue color (or other colors) background.

Fig. 2. Reference mask image generation for Lena (a) ROI image obtain by using passion matting; (b) Binary image converted from (a); (c) Morphology filtering result of (b)

Page 10: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

3. Proposed scheme

3.2. Watermark embedding Kundur et al. Firstly, we define a quantization function for our

watermark embedding function. Quantization function

Our watermark embedding function is defined as follows

Page 11: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

3. Proposed scheme

3.3. Watermark detection watermark detection, copyright owner use binary reference mask

image BM that was preserve in the step of watermark embedding and the same parameter K as random seed to retrieve binary image watermark ' W .

Page 12: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

4. Experiments and results

Page 13: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

4. Experiments and results

Fig. 4. (a) Tamper inside ROI ; (b) Embedding watermark ' W ;

(c)Extracted watermark " W ; (d) Tamper location inside ROI revealed

by T

Page 14: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

4. Experiments and results

Figure 5. (a) Tamper in the exterior of ROI; (b) Embedding watermark ' W ; (c) Extracted watermark " W ; (d) T =0 , no alarm occurred;

Page 15: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.com

5. Conclusion

A secure watermarking for ROI of image authentication based on foreground extraction has been presented.

Experiment results have demonstrated that the proposed scheme is capable of detecting tamper in the interior of ROI and tolerating tamper exterior of ROI.

Page 16: LOGO  Region of Interest Fragile Watermarking for Image Authentication 指導老師:陳炳彰老師 學生:林青照

www.themegallery.comLOGO

Add your company slogan