2014
DOI: 10.1007/s00500-014-1373-y
|View full text |Cite
|
Sign up to set email alerts
|

Fragile watermarking using Karhunen–Loève transform: the KLT-F approach

Abstract: The paper presents a fragile watermarking technique that may be used to discover image manipulations at block level. The proposed algorithm, based on the Karhunen-Loève linear transform (KLT), modifies some of the KLT coefficients obtained from a secret base (defined by a secret key image) so that they contain a binary pseudo-random message. A genetic algorithm (GA) is used to compensate for rounding errors introduced by inverse transforming in the integer pixel domain. An extensive experimentation has been pe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…In a previous study [4], we also focused on the analysis of the watermarking algorithm properties, by setting the GA parameters to default values (population size=100, mutation probability p m =0.05, crossover probability p c =0.8, terminate if best individual does not change in the last 10 generations or 2000 generations reached) and obtaining good quality results (PSNR between 53 and 54 dB).…”
Section: Resultsmentioning
confidence: 99%
“…In a previous study [4], we also focused on the analysis of the watermarking algorithm properties, by setting the GA parameters to default values (population size=100, mutation probability p m =0.05, crossover probability p c =0.8, terminate if best individual does not change in the last 10 generations or 2000 generations reached) and obtaining good quality results (PSNR between 53 and 54 dB).…”
Section: Resultsmentioning
confidence: 99%
“…a. Multimedia forensics A large part of related research concerns tampering detection and image/video forensics algorithms. Proposed algorithms attempt to detect and localize image modifications, either actively by embedding watermarks in multimedia content and monitoring their integrity (Dadkhah et al, 2014) (Botta et al, 2015), or passively by searching for telltale self-repetitions (Zandi et al, 2016) (Ferreira et al, 2016) or inconsistencies in the image. Such inconsistencies may appear in the pixel domain or the compressed domain depending on the specific process of tampering.…”
Section: Related Workmentioning
confidence: 99%
“…A large body of research concerns the detection of traces of forgery and tampering in multimedia items (InVID work in this area is further presented in Chapter 6 of this volume). A family of algorithms, known as "active forensics" attempt to deal with image modifications by embedding watermarks in multimedia content and monitoring their integrity [13,5]. Another strand of work focuses on searching for telltale self-repetitions [51,17] or inconsistencies in the image, without making any further assumptions.…”
Section: Related Workmentioning
confidence: 99%