Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/13425
Title: | An efficient secure reversible authentication watermarking with tamper localization |
Researcher: | Meenakshi Devi P |
Guide(s): | Duraiswamy, K. |
Keywords: | Digital information, multimedia data, digital watermarking, Reversible Authentication Watermaking Techniques, Tamper Localization |
Upload Date: | 28-Nov-2013 |
University: | Anna University |
Completed Date: | |
Abstract: | In the recent decade, the digital information revolution has made the manipulation of multimedia data as effortless as possible. As digital media are gaining wider popularity, their security related issues are of greater concern. Digital Watermarking allows an individual to add copyright notices or other verification messages to digital media. The primary objective of authentication is not to protect the contents from being copied or stolen, but is to provide a method to authenticate the image and assure the integrity of the image. A fragile watermark breaks very easily on modifying the host signal. Further, in most conventional authentication techniques based on watermarking, the original image is distorted permanently due to the authentication itself. These distortions are not tolerable in some sensitive applications, such as law enforcement, medical and military images. In this thesis, an AWT which satisfies all these requirements is proposed and referred to as Reversible Authentication Watermarking Techniques with Tamper Localization . Three levels of AWTs have been proposed. In the first level, only the image integrity and authenticity is verified. The proposed second level AWT locates tampers in the image in addition to authenticity and integrity verification. The block-based schemes are vulnerable to vector quantization attack and the pixel-wise schemes are vulnerable to oracle attack, if the pixel scan order is public. Hence, in this thesis, wavelet domain is used for tamper localization which overcomes both the attacks. The proposed scheme finds tamper positions at pixel level. The watermark embedding is carried out in wavelet domain. Most of the existing AWTs provide either tamper localization or reversible authentication, but not both. The proposed third level Reversible AWT verifies authenticity, locates tampers and recovers the original image if the image is authentic. If the image is not authentic, it localizes the tamper positions. newline newline newline |
Pagination: | xxi, 170 |
URI: | http://hdl.handle.net/10603/13425 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 49.42 kB | Adobe PDF | View/Open |
02_certificates.pdf | 862.69 kB | Adobe PDF | View/Open | |
03_abstract.pdf | 13.07 kB | Adobe PDF | View/Open | |
04_acknowledgement.pdf | 14.53 kB | Adobe PDF | View/Open | |
05_contents.pdf | 76.5 kB | Adobe PDF | View/Open | |
06_chapter 1.pdf | 89.24 kB | Adobe PDF | View/Open | |
07_chapter 2.pdf | 65.85 kB | Adobe PDF | View/Open | |
08_chapter 3.pdf | 478.07 kB | Adobe PDF | View/Open | |
09_chapter 4.pdf | 159.61 kB | Adobe PDF | View/Open | |
10_chapter 5.pdf | 180.95 kB | Adobe PDF | View/Open | |
11_chapter 6.pdf | 877.7 kB | Adobe PDF | View/Open | |
12_chapter 7.pdf | 18.42 kB | Adobe PDF | View/Open | |
13_appendices 1 and 2.pdf | 935.76 kB | Adobe PDF | View/Open | |
14_references.pdf | 41.08 kB | Adobe PDF | View/Open | |
15_publications.pdf | 16.45 kB | Adobe PDF | View/Open | |
16_vitae.pdf | 11.89 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: