Fragile watermarking using Karhunen-Loève transform: the KLT-F approach
Gespeichert in:
Verfasser / Beitragende:
[Marco Botta, Davide Cavagnino, Victor Pomponiu]
Ort, Verlag, Jahr:
2015
Enthalten in:
Soft Computing, 19/7(2015-07-01), 1905-1919
Format:
Artikel (online)
Online Zugang:
| LEADER | caa a22 4500 | ||
|---|---|---|---|
| 001 | 605469121 | ||
| 003 | CHVBK | ||
| 005 | 20210128100320.0 | ||
| 007 | cr unu---uuuuu | ||
| 008 | 210128e20150701xx s 000 0 eng | ||
| 024 | 7 | 0 | |a 10.1007/s00500-014-1373-y |2 doi |
| 035 | |a (NATIONALLICENCE)springer-10.1007/s00500-014-1373-y | ||
| 245 | 0 | 0 | |a Fragile watermarking using Karhunen-Loève transform: the KLT-F approach |h [Elektronische Daten] |c [Marco Botta, Davide Cavagnino, Victor Pomponiu] |
| 520 | 3 | |a The paper presents a fragile watermarking technique that may be used to discover image manipulations at block level. The proposed algorithm, based on the Karhunen-Loève linear transform (KLT), modifies some of the KLT coefficients obtained from a secret base (defined by a secret key image) so that they contain a binary pseudo-random message. A genetic algorithm is used to compensate for rounding errors introduced by inverse transforming in the integer pixel domain. An extensive experimentation has been performed to test the effectiveness of the method and to show the sensitivity of the algorithm to single pixel modifications (also as a function of the number of modified coefficients). A comparison with other fragile watermarking methods is reported. It should be noted that the proposed approach results in both a high PSNR (more than 53 dB on average) and a high subjective quality. The system may be tested online by submitting images to be watermarked and subsequently verifying the presence of modifications in a previously marked image. | |
| 540 | |a Springer-Verlag Berlin Heidelberg, 2014 | ||
| 690 | 7 | |a Fragile watermarking |2 nationallicence | |
| 690 | 7 | |a Content authentication |2 nationallicence | |
| 690 | 7 | |a Karhunen-Loève transform |2 nationallicence | |
| 690 | 7 | |a Genetic algorithms |2 nationallicence | |
| 690 | 7 | |a Data security |2 nationallicence | |
| 700 | 1 | |a Botta |D Marco |u Dipartimento di Informatica, Università degli Studi di Torino, Corso Svizzera 185, 10149, Torino, Italy |4 aut | |
| 700 | 1 | |a Cavagnino |D Davide |u Dipartimento di Informatica, Università degli Studi di Torino, Corso Svizzera 185, 10149, Torino, Italy |4 aut | |
| 700 | 1 | |a Pomponiu |D Victor |u Department of Radiology, University of Pittsburgh, 3362 Fifth Avenue, 15213, Pittsburgh, PA, USA |4 aut | |
| 773 | 0 | |t Soft Computing |d Springer Berlin Heidelberg |g 19/7(2015-07-01), 1905-1919 |x 1432-7643 |q 19:7<1905 |1 2015 |2 19 |o 500 | |
| 856 | 4 | 0 | |u https://doi.org/10.1007/s00500-014-1373-y |q text/html |z Onlinezugriff via DOI |
| 898 | |a BK010053 |b XK010053 |c XK010000 | ||
| 900 | 7 | |a Metadata rights reserved |b Springer special CC-BY-NC licence |2 nationallicence | |
| 908 | |D 1 |a research-article |2 jats | ||
| 949 | |B NATIONALLICENCE |F NATIONALLICENCE |b NL-springer | ||
| 950 | |B NATIONALLICENCE |P 856 |E 40 |u https://doi.org/10.1007/s00500-014-1373-y |q text/html |z Onlinezugriff via DOI | ||
| 950 | |B NATIONALLICENCE |P 700 |E 1- |a Botta |D Marco |u Dipartimento di Informatica, Università degli Studi di Torino, Corso Svizzera 185, 10149, Torino, Italy |4 aut | ||
| 950 | |B NATIONALLICENCE |P 700 |E 1- |a Cavagnino |D Davide |u Dipartimento di Informatica, Università degli Studi di Torino, Corso Svizzera 185, 10149, Torino, Italy |4 aut | ||
| 950 | |B NATIONALLICENCE |P 700 |E 1- |a Pomponiu |D Victor |u Department of Radiology, University of Pittsburgh, 3362 Fifth Avenue, 15213, Pittsburgh, PA, USA |4 aut | ||
| 950 | |B NATIONALLICENCE |P 773 |E 0- |t Soft Computing |d Springer Berlin Heidelberg |g 19/7(2015-07-01), 1905-1919 |x 1432-7643 |q 19:7<1905 |1 2015 |2 19 |o 500 | ||