TY - JOUR
T1 - A sequential quantization strategy for data embedding and integrity verification
AU - CHEUNG, Yiu Ming
AU - Wu, Hao Tian
N1 - Funding Information:
Manuscript received October 12, 2006; revised February 8, 2007. This work was supported by the Faculty Research Grant of Hong Kong Baptist University under Project FRG/06-07/II-07 and in part by the Research Grant Council of Hong Kong under Grants HKBU 2156/04E and HKBU 210306. This paper was recommended by Associate Editor Q. Sun.
PY - 2007/8
Y1 - 2007/8
N2 - Quantization-based embedding has been used for integrity verification in semi-fragile watermarking. However, some of the illegal modifications cannot be detected in the normal quantization-based methods, especially when the host values (i.e., the values chosen in a host signal for data embedding) are independent from each other. In this paper, a sequential quantization strategy (SQS) is proposed to make the modulation of a host value dependent on a certain number of the previous ones. Therefore, a balance between security improvement and tamper localization can be achieved for integrity verification. Furthermore, the proposed SQS is incorporated with a reversible data hiding mechanism. A new watermarking algorithm is then generated for mesh authentication. The experimental results show that the chance to detect illegal modifications is increased by adopting the SQS while the property of reversibility is achieved.
AB - Quantization-based embedding has been used for integrity verification in semi-fragile watermarking. However, some of the illegal modifications cannot be detected in the normal quantization-based methods, especially when the host values (i.e., the values chosen in a host signal for data embedding) are independent from each other. In this paper, a sequential quantization strategy (SQS) is proposed to make the modulation of a host value dependent on a certain number of the previous ones. Therefore, a balance between security improvement and tamper localization can be achieved for integrity verification. Furthermore, the proposed SQS is incorporated with a reversible data hiding mechanism. A new watermarking algorithm is then generated for mesh authentication. The experimental results show that the chance to detect illegal modifications is increased by adopting the SQS while the property of reversibility is achieved.
KW - Fragile watermarking
KW - Mesh authentication
KW - Reversible data hiding
KW - Sequential quantization strategy (SQS)
UR - http://www.scopus.com/inward/record.url?scp=34548289815&partnerID=8YFLogxK
U2 - 10.1109/TCSVT.2007.903553
DO - 10.1109/TCSVT.2007.903553
M3 - Journal article
AN - SCOPUS:34548289815
SN - 1051-8215
VL - 17
SP - 1007
EP - 1016
JO - IEEE Transactions on Circuits and Systems for Video Technology
JF - IEEE Transactions on Circuits and Systems for Video Technology
IS - 8
ER -