🔧На сайте запланированы технические работы
25.12.2025 в промежутке с 18:00 до 21:00 по Московскому времени (GMT+3) на сайте будут проводиться плановые технические работы. Возможны перебои с доступом к сайту. Приносим извинения за временные неудобства. Благодарим за понимание!
🔧Site maintenance is scheduled.
Scheduled maintenance will be performed on the site from 6:00 PM to 9:00 PM Moscow time (GMT+3) on December 25, 2025. Site access may be interrupted. We apologize for the inconvenience. Thank you for your understanding!

 

Novel watermarking scheme for image authentication using vector quantization approach


Citar

Texto integral

Acesso aberto Acesso aberto
Acesso é fechado Acesso está concedido
Acesso é fechado Somente assinantes

Resumo

In this paper a new invisible watermarking algorithm using vector quantization (VQ) approach for image content authentication application is proposed. At the first stage, a robust verification watermark is embedded using properties of indices of vector quantized image using key based approach. At the second stage, the semi-fragile watermark is embedded by using modified index key based (MIKB) method. Robust watermark andVQenhance the security of the system by providing its double protection. The semi-fragile watermark is utilized for the authentication of the received image. Blind extraction of the watermark is performed independently in two successive steps i.e. in the order of embedding. Further, in oder to classify quantitatively an incidental or intentional attack, which at present is not being followed, a quantitative threshold approach using pixel neighborhood clustering is suggested. The existing methods employ the qualitative approach of identifying incidental or intentional attacks. Imperceptibility of watermarked image is 41 dB on the average, and it is also possible to detect and locate tamper with very high sensitivity. The present scheme is compared with the existing algorithms. The performance of proposed algorithm has been tested on various practical images. It outperforms in distinguishing malicious tampering from content preserving changes and the tampered regions are accurately localized.

Sobre autores

Archana Tiwari

Chhatrapati Shivaji Institute of Technology

Autor responsável pela correspondência
Email: archanat1972@gmail.com
Índia, Durg

Manisha Sharma

Bhilai Institute of Technology

Email: archanat1972@gmail.com
Índia, Durg

Arquivos suplementares

Arquivos suplementares
Ação
1. JATS XML

Declaração de direitos autorais © Allerton Press, Inc., 2017