TY - JOUR
T1 - An integrated visual saliency-based watermarking approach for synchronous image authentication and copyright protection
AU - Tian, Lihua
AU - Zheng, Nanning
AU - Xue, Jianru
AU - Li, Ce
AU - Wang, Xiaofeng
PY - 2011/10
Y1 - 2011/10
N2 - This paper proposes an integrated visual saliency-based watermarking approach, which can be used for both synchronous image authentication and copyright protection. Firstly, regions of interest (ROIs), which are not in a fixed size and can present the most important information of one image, would be extracted automatically using the proto-object based saliency attention model. Secondly, to resist common signal processing attacks, for each ROI, an improved quantization method is employed to embed the copyright information into its DCT coefficients. Finally, the edge map of one ROI is chosen as the fragile watermark, and is then embedded into the DWT domain of the watermarked image to further resist the tampering attacks. Using ROI-based visual saliency as a bridge, this proposed method can achieve image authentication and copyright protection synchronously, and it can also preserve much more robust information. Experimental results on standard benchmark demonstrate that compared with the state-of-the-art watermarking scheme, the proposed method is more robust to white noise, filtering and JPEG compression attacks. Furthermore, it also shows that the proposed method can effectively detect tamper and locate forgery.
AB - This paper proposes an integrated visual saliency-based watermarking approach, which can be used for both synchronous image authentication and copyright protection. Firstly, regions of interest (ROIs), which are not in a fixed size and can present the most important information of one image, would be extracted automatically using the proto-object based saliency attention model. Secondly, to resist common signal processing attacks, for each ROI, an improved quantization method is employed to embed the copyright information into its DCT coefficients. Finally, the edge map of one ROI is chosen as the fragile watermark, and is then embedded into the DWT domain of the watermarked image to further resist the tampering attacks. Using ROI-based visual saliency as a bridge, this proposed method can achieve image authentication and copyright protection synchronously, and it can also preserve much more robust information. Experimental results on standard benchmark demonstrate that compared with the state-of-the-art watermarking scheme, the proposed method is more robust to white noise, filtering and JPEG compression attacks. Furthermore, it also shows that the proposed method can effectively detect tamper and locate forgery.
KW - Image authentication
KW - Tamper detection and localization
KW - Visual saliency
KW - Watermarking
UR - https://www.scopus.com/pages/publications/80052726001
U2 - 10.1016/j.image.2011.06.001
DO - 10.1016/j.image.2011.06.001
M3 - 文章
AN - SCOPUS:80052726001
SN - 0923-5965
VL - 26
SP - 427
EP - 437
JO - Signal Processing: Image Communication
JF - Signal Processing: Image Communication
IS - 8-9
ER -