Intelligent Watermarking Scheme for image Authentication and Recovery

Created by W.Langdon from gp-bibliography.bib Revision:1.4067

@Article{oai:thesai.org:10.14569/IJACSA.2017.080527,
  author =       "Rafi Ullah and Hani Ali Alquhayz",
  title =        "Intelligent Watermarking Scheme for image
                 Authentication and Recovery",
  journal =      "International Journal of Advanced Computer Science and
                 Applications (IJACSA)",
  year =         "2017",
  volume =       "8",
  number =       "5",
  keywords =     "genetic algorithms, genetic programming, watermarking,
                 authentication, quantisation, recovery",
  publisher =    "The Science and Information (SAI) Organization",
  bibsource =    "OAI-PMH server at thesai.org",
  description =  "International Journal of Advanced Computer Science and
                 Applications(IJACSA), 8(5), 2017",
  language =     "eng",
  oai =          "oai:thesai.org:10.14569/IJACSA.2017.080527",
  URL =          "http://thesai.org/Downloads/Volume8No5/Paper_27-Intelligent_Watermarking_Scheme_for_Image_Authentication.pdf",
  DOI =          "doi:10.14569/IJACSA.2017.080527",
  abstract =     "Recently, researchers have proposed semi-fragile
                 watermarking techniques with the additional capability
                 of image recovery. However, these approaches have
                 certain limitations with respect to capacity,
                 imperceptibility, and robustness. In this paper, we are
                 proposing two independent watermarks, one for image
                 recovery and the other for authentication. The first
                 watermark (image digest), a highly compressed version
                 of the original image itself, is used to recover the
                 distorted image. Unlike the traditional quantisation
                 matrix, genetic programming based matrices are used for
                 compression purposes. These matrices are based on the
                 local characteristics of the original image.
                 Furthermore, a second watermark, which is a
                 pseudo-random binary matrix, is generated to
                 authenticate the host image precisely. Experimental
                 results show that the semi-fragility of the watermarks
                 makes the proposed scheme tolerant of JPEG lossy
                 compression and it locates the tampered regions
                 accurately.",
}

Genetic Programming entries for Rafi Ullah Habib Hani Ali Alquhayz

Citations