Please use this identifier to cite or link to this item:
Title: An efficient secure reversible authentication watermarking with tamper localization
Researcher: Meenakshi Devi P
Guide(s): Duraiswamy, K.
Keywords: Digital information, multimedia data, digital watermarking, Reversible Authentication Watermaking Techniques, Tamper Localization
Upload Date: 28-Nov-2013
University: Anna University
Completed Date: 
Abstract: In the recent decade, the digital information revolution has made the manipulation of multimedia data as effortless as possible. As digital media are gaining wider popularity, their security related issues are of greater concern. Digital Watermarking allows an individual to add copyright notices or other verification messages to digital media. The primary objective of authentication is not to protect the contents from being copied or stolen, but is to provide a method to authenticate the image and assure the integrity of the image. A fragile watermark breaks very easily on modifying the host signal. Further, in most conventional authentication techniques based on watermarking, the original image is distorted permanently due to the authentication itself. These distortions are not tolerable in some sensitive applications, such as law enforcement, medical and military images. In this thesis, an AWT which satisfies all these requirements is proposed and referred to as Reversible Authentication Watermarking Techniques with Tamper Localization . Three levels of AWTs have been proposed. In the first level, only the image integrity and authenticity is verified. The proposed second level AWT locates tampers in the image in addition to authenticity and integrity verification. The block-based schemes are vulnerable to vector quantization attack and the pixel-wise schemes are vulnerable to oracle attack, if the pixel scan order is public. Hence, in this thesis, wavelet domain is used for tamper localization which overcomes both the attacks. The proposed scheme finds tamper positions at pixel level. The watermark embedding is carried out in wavelet domain. Most of the existing AWTs provide either tamper localization or reversible authentication, but not both. The proposed third level Reversible AWT verifies authenticity, locates tampers and recovers the original image if the image is authentic. If the image is not authentic, it localizes the tamper positions. newline newline newline
Pagination: xxi, 170
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File49.42 kBAdobe PDFView/Open
02_certificates.pdf862.69 kBAdobe PDFView/Open
03_abstract.pdf13.07 kBAdobe PDFView/Open
04_acknowledgement.pdf14.53 kBAdobe PDFView/Open
05_contents.pdf76.5 kBAdobe PDFView/Open
06_chapter 1.pdf89.24 kBAdobe PDFView/Open
07_chapter 2.pdf65.85 kBAdobe PDFView/Open
08_chapter 3.pdf478.07 kBAdobe PDFView/Open
09_chapter 4.pdf159.61 kBAdobe PDFView/Open
10_chapter 5.pdf180.95 kBAdobe PDFView/Open
11_chapter 6.pdf877.7 kBAdobe PDFView/Open
12_chapter 7.pdf18.42 kBAdobe PDFView/Open
13_appendices 1 and 2.pdf935.76 kBAdobe PDFView/Open
14_references.pdf41.08 kBAdobe PDFView/Open
15_publications.pdf16.45 kBAdobe PDFView/Open
16_vitae.pdf11.89 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.