Filters








968 Hits in 3.5 sec

A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication [chapter]

HongJie He, JiaShu Zhang, Heng-Ming Tai
2006 Lecture Notes in Computer Science  
This paper proposes a wavelet-based fragile watermarking scheme for secure image authentication.  ...  In the proposed scheme, the embedded watermark is generated using the discrete wavelet transform (DWT), and then the improved security watermark by scrambling encryption is embedded into the least significant  ...  This work is partially supported by the Program for New Century Excellent Talents in University of China (NCET-05-0794), the Sichuan Youth Science and Technology Foundation (03ZQ026-033 and 51430804QT2201  ... 
doi:10.1007/11922841_34 fatcat:j4ezdl2cnff6nagcfpwksc74me

A Secure Semi-Fragile Watermarking Scheme For Authentication And Recovery Of Images Based On Wavelet Transform

Rafiullah Chamlawi, Asifullah Khan, Adnan Idris, Zahid Munir
2008 Zenodo  
Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded.  ...  This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness.  ...  In this paper, we will address the secure semi-fragile watermarking for image authentic-cation and recovery based on integer wavelet transform with parameters.  ... 
doi:10.5281/zenodo.1058882 fatcat:fcfmzeqiejbvrpj2vlz3wrajza

A Semi-fragile Watermarking for ROI Image Authentication

Delong Cui
2008 2008 International Conference on MultiMedia and Information Technology  
In this paper, a watermarking algorithm for ROI (Regions of Interesting) authentication and tamper detection is proposed.  ...  The algorithm uses a hashing to detect whether the ROI of image is tampered, and then uses the watermarking to reconstruct the data of ROI.  ...  Wu and Liu [3] proposed fragile watermarking scheme based on modifying the quantized DCT coefficients according to a special LUT.  ... 
doi:10.1109/mmit.2008.145 fatcat:73htl6l2azfnhg6bf6ezyxoicm

Semi Fragile Watermark With Self Authentication And Self Recovery

Woo Chaw Seng, Jiang Du, Binh Pham
2009 Malaysian Journal of Computer Science  
The scheme embeds a downscaled version of an image into the image's discrete wavelet transform subbands.  ...  Very few watermarking scheme has both self authentication and self recovery features. We developed and evaluated a semi fragile watermarking scheme that offers these features.  ...  Overall, the watermarking scheme achieved its objectives in providing self authentication and self recovery in a semi fragile manner.  ... 
doi:10.22452/mjcs.vol22no1.5 fatcat:w7hqwehjbnanne5kh5ueu4in64

Multiscale Fragile Watermarking Based on the Gaussian Mixture Model

H. Yuan, X.-P. Zhang
2006 IEEE Transactions on Image Processing  
presented new fragile watermarking scheme for authentication.  ...  In this paper, a new multiscale fragile watermarking scheme based on the Gaussian mixture model (GMM) is presented.  ...  presented new fragile watermarking scheme for authentication.  ... 
doi:10.1109/tip.2006.877310 pmid:17022280 fatcat:wmicgecjizbhhji3y6q6kbld2y

Semifragile Watermarking Schemes for Image Authentication- A Survey

Archana Tiwari, Manisha Sharma
2012 International Journal of Computer Network and Information Security  
To project authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in content authentication.  ...  Finally some observations are given based on literature survey of algorithms and techniques of semifragile watermarking techniques  ...  The digital-signature-based image authentication scheme computes the digest for an image and stores it in a separate file.  ... 
doi:10.5815/ijcnis.2012.02.07 fatcat:erve72akj5g4flymokbjirrsze

Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization

M.A. Mohamed, Abdelhameed Ibrahim, M.G. Abd-El-Fattah, A.S. Samrah
2015 International Journal of Computer Applications  
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization.  ...  The first proposed fragile watermarking scheme can be classified as a block-based scheme that divides the cover image into non-overlapping 4×4 blocks.  ...  The first scheme is a block-based watermarking scheme and the other one is a wavelet-based watermarking scheme.  ... 
doi:10.5120/ijca2015906014 fatcat:ptpldixsmfbrlizuothcbbsahi

A Survey on Fragile Digital Watermarking

2016 International Journal of Science and Research (IJSR)  
But still there is a chance to analyse and determine the requirement of a watermarking scheme with respect to the attributes like; fidelity and capacity in the areas like content based watermarking, tamper  ...  Several major research fields have been identified in case of digital image processing and in information security , one among them is the digital watermarking.  ...  Literature Survey (C.kailasanathan ,2003) proposed a paper that describes about a scheme based on fragile watermarking for authenticating images based on the Yeung-Mintzer scheme.  ... 
doi:10.21275/v5i4.nov163126 fatcat:qlbqiuhqa5du5nuwzyscmlkqqe

Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication

Archana Tiwari, Manisha Sharma
2012 Journal of Information Security  
The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking.  ...  are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested.  ...  In present paper existing semifragile watermarking schemes are discussed for image authentication application.  ... 
doi:10.4236/jis.2012.33023 fatcat:eppi6bojjzeolliypmn4u3a6uq

Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform [chapter]

Xiaoyun Wu, Xiaoping Liang, Hongmei Liu, Jiwu Huang, Guoping Qiu
2006 Lecture Notes in Computer Science  
In this paper, we propose a novel reversible semi-fragile image authentication scheme.  ...  Semi-fragile image authentication based on watermarking has drawn extensive attention.  ...  [18] proposed a lossless semi-fragile authentication scheme based on integer wavelet transform (IWT).  ... 
doi:10.1007/11787952_11 fatcat:rihwrorzdjgezfkxxbmsnf737i

A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization

Xiaojun Qi, Xing Xin
2015 Journal of Visual Communication and Image Representation  
presents a singular-value-based semi-fragile watermarking scheme for image content authentication.  ...  The proposed scheme generates secure watermark by performing a logical operation on content-dependent watermark generated by a singular-value-based sequence and contentindependent watermark generated by  ...  Conclusions We present an effective SV-based semi-fragile watermarking scheme for image content authentication with tamper localization.  ... 
doi:10.1016/j.jvcir.2015.05.006 fatcat:tpv6ircgbvblzisdy6iznfceoq

Review on watermarking scheme for image authentication and tamper detection

2016 International Journal of Latest Trends in Engineering and Technology  
Preda [12] , proposed a semi fragile watermarking for tamper detection and image authentication using wavelet domain.  ...  HongJie He, JiaShu Zhang, and Heng-Ming Tai [14] , proposed scheme for image authentication based on wavelet based fragile watermarking in which it finds that whether modification done with the content  ... 
doi:10.21172/1.81.066 fatcat:qkeqw6fbgbfe5ivxlzet263nai

A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using Integer Wavelet Transform

P. MeenakshiD, M. Venkatesan, K. Duraiswamy
2009 Journal of Computer Science  
Approach: In this study, we proposed a fragile image authentication system with tamper localization in wavelet domain. In this scheme, secret data to be embedded is a logo.  ...  Method for authenticating and assuring the integrity of the image is required.  ...  CONCLUSION A wavelet-based fragile watermarking scheme for secure image authentication has been presented.  ... 
doi:10.3844/jcssp.2009.831.837 fatcat:okbdjmno4bhqfgtoaokk7yvobi

Digital Signature Scheme for Image

Kanchan K.Doke, S. M. Patil
2012 International Journal of Computer Applications  
These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content.  ...  Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications.  ...  For example: 1.A novel mutual image-based authentication framework [13] has been presented. It consists in a challenge-response scheme based on visual password and image scrambling.  ... 
doi:10.5120/7708-1012 fatcat:j7ielheatvbbzcv5nrm37hr6aq

Wavelet packets-based digital watermarking for image verification and authentication

Alexandre H Paquet, Rabab K Ward, Ioannis Pitas
2003 Signal Processing  
In this paper, we present a novel watermarking scheme to ensure the authenticity of digital images.  ...  The image protection is achieved by the insertion of a secret author's identification key in the image wavelet coefficients by their selective quantization.  ...  Conclusions and Future Work In this paper, we have presented a technique for digital image authentication based on semi-fragile watermarking.  ... 
doi:10.1016/s0165-1684(03)00171-3 fatcat:wa54tqtrdjcgriihmqmwnoywmm
« Previous Showing results 1 — 15 out of 968 results