🔧На сайте запланированы технические работы
25.12.2025 в промежутке с 18:00 до 21:00 по Московскому времени (GMT+3) на сайте будут проводиться плановые технические работы. Возможны перебои с доступом к сайту. Приносим извинения за временные неудобства. Благодарим за понимание!
🔧Site maintenance is scheduled.
Scheduled maintenance will be performed on the site from 6:00 PM to 9:00 PM Moscow time (GMT+3) on December 25, 2025. Site access may be interrupted. We apologize for the inconvenience. Thank you for your understanding!

 

Novel watermarking scheme for image authentication using vector quantization approach


Дәйексөз келтіру

Толық мәтін

Ашық рұқсат Ашық рұқсат
Рұқсат жабық Рұқсат берілді
Рұқсат жабық Тек жазылушылар үшін

Аннотация

In this paper a new invisible watermarking algorithm using vector quantization (VQ) approach for image content authentication application is proposed. At the first stage, a robust verification watermark is embedded using properties of indices of vector quantized image using key based approach. At the second stage, the semi-fragile watermark is embedded by using modified index key based (MIKB) method. Robust watermark andVQenhance the security of the system by providing its double protection. The semi-fragile watermark is utilized for the authentication of the received image. Blind extraction of the watermark is performed independently in two successive steps i.e. in the order of embedding. Further, in oder to classify quantitatively an incidental or intentional attack, which at present is not being followed, a quantitative threshold approach using pixel neighborhood clustering is suggested. The existing methods employ the qualitative approach of identifying incidental or intentional attacks. Imperceptibility of watermarked image is 41 dB on the average, and it is also possible to detect and locate tamper with very high sensitivity. The present scheme is compared with the existing algorithms. The performance of proposed algorithm has been tested on various practical images. It outperforms in distinguishing malicious tampering from content preserving changes and the tampered regions are accurately localized.

Авторлар туралы

Archana Tiwari

Chhatrapati Shivaji Institute of Technology

Хат алмасуға жауапты Автор.
Email: archanat1972@gmail.com
Үндістан, Durg

Manisha Sharma

Bhilai Institute of Technology

Email: archanat1972@gmail.com
Үндістан, Durg

Қосымша файлдар

Қосымша файлдар
Әрекет
1. JATS XML

© Allerton Press, Inc., 2017