A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Wavelet-Based Fragile Watermarking Scheme for Secure Image Authentication
[chapter]
2006
Lecture Notes in Computer Science
This paper proposes a wavelet-based fragile watermarking scheme for secure image authentication. ...
In the proposed scheme, the embedded watermark is generated using the discrete wavelet transform (DWT), and then the improved security watermark by scrambling encryption is embedded into the least significant ...
This work is partially supported by the Program for New Century Excellent Talents in University of China (NCET-05-0794), the Sichuan Youth Science and Technology Foundation (03ZQ026-033 and 51430804QT2201 ...
doi:10.1007/11922841_34
fatcat:j4ezdl2cnff6nagcfpwksc74me
A Secure Semi-Fragile Watermarking Scheme For Authentication And Recovery Of Images Based On Wavelet Transform
2008
Zenodo
Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. ...
This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. ...
In this paper, we will address the secure semi-fragile watermarking for image authentic-cation and recovery based on integer wavelet transform with parameters. ...
doi:10.5281/zenodo.1058882
fatcat:fcfmzeqiejbvrpj2vlz3wrajza
A Semi-fragile Watermarking for ROI Image Authentication
2008
2008 International Conference on MultiMedia and Information Technology
In this paper, a watermarking algorithm for ROI (Regions of Interesting) authentication and tamper detection is proposed. ...
The algorithm uses a hashing to detect whether the ROI of image is tampered, and then uses the watermarking to reconstruct the data of ROI. ...
Wu and Liu [3] proposed fragile watermarking scheme based on modifying the quantized DCT coefficients according to a special LUT. ...
doi:10.1109/mmit.2008.145
fatcat:73htl6l2azfnhg6bf6ezyxoicm
Semi Fragile Watermark With Self Authentication And Self Recovery
2009
Malaysian Journal of Computer Science
The scheme embeds a downscaled version of an image into the image's discrete wavelet transform subbands. ...
Very few watermarking scheme has both self authentication and self recovery features. We developed and evaluated a semi fragile watermarking scheme that offers these features. ...
Overall, the watermarking scheme achieved its objectives in providing self authentication and self recovery in a semi fragile manner. ...
doi:10.22452/mjcs.vol22no1.5
fatcat:w7hqwehjbnanne5kh5ueu4in64
Multiscale Fragile Watermarking Based on the Gaussian Mixture Model
2006
IEEE Transactions on Image Processing
presented new fragile watermarking scheme for authentication. ...
In this paper, a new multiscale fragile watermarking scheme based on the Gaussian mixture model (GMM) is presented. ...
presented new fragile watermarking scheme for authentication. ...
doi:10.1109/tip.2006.877310
pmid:17022280
fatcat:wmicgecjizbhhji3y6q6kbld2y
Semifragile Watermarking Schemes for Image Authentication- A Survey
2012
International Journal of Computer Network and Information Security
To project authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in content authentication. ...
Finally some observations are given based on literature survey of algorithms and techniques of semifragile watermarking techniques ...
The digital-signature-based image authentication scheme computes the digest for an image and stores it in a separate file. ...
doi:10.5815/ijcnis.2012.02.07
fatcat:erve72akj5g4flymokbjirrsze
Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
2015
International Journal of Computer Applications
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. ...
The first proposed fragile watermarking scheme can be classified as a block-based scheme that divides the cover image into non-overlapping 4×4 blocks. ...
The first scheme is a block-based watermarking scheme and the other one is a wavelet-based watermarking scheme. ...
doi:10.5120/ijca2015906014
fatcat:ptpldixsmfbrlizuothcbbsahi
A Survey on Fragile Digital Watermarking
2016
International Journal of Science and Research (IJSR)
But still there is a chance to analyse and determine the requirement of a watermarking scheme with respect to the attributes like; fidelity and capacity in the areas like content based watermarking, tamper ...
Several major research fields have been identified in case of digital image processing and in information security , one among them is the digital watermarking. ...
Literature Survey (C.kailasanathan ,2003) proposed a paper that describes about a scheme based on fragile watermarking for authenticating images based on the Yeung-Mintzer scheme. ...
doi:10.21275/v5i4.nov163126
fatcat:qlbqiuhqa5du5nuwzyscmlkqqe
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication
2012
Journal of Information Security
The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking. ...
are described and focus is on their comparison according to the properties cited above and future directions for developing a better image authentication algorithm are suggested. ...
In present paper existing semifragile watermarking schemes are discussed for image authentication application. ...
doi:10.4236/jis.2012.33023
fatcat:eppi6bojjzeolliypmn4u3a6uq
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform
[chapter]
2006
Lecture Notes in Computer Science
In this paper, we propose a novel reversible semi-fragile image authentication scheme. ...
Semi-fragile image authentication based on watermarking has drawn extensive attention. ...
[18] proposed a lossless semi-fragile authentication scheme based on integer wavelet transform (IWT). ...
doi:10.1007/11787952_11
fatcat:rihwrorzdjgezfkxxbmsnf737i
A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization
2015
Journal of Visual Communication and Image Representation
presents a singular-value-based semi-fragile watermarking scheme for image content authentication. ...
The proposed scheme generates secure watermark by performing a logical operation on content-dependent watermark generated by a singular-value-based sequence and contentindependent watermark generated by ...
Conclusions We present an effective SV-based semi-fragile watermarking scheme for image content authentication with tamper localization. ...
doi:10.1016/j.jvcir.2015.05.006
fatcat:tpv6ircgbvblzisdy6iznfceoq
Review on watermarking scheme for image authentication and tamper detection
2016
International Journal of Latest Trends in Engineering and Technology
Preda [12] , proposed a semi fragile watermarking for tamper detection and image authentication using wavelet domain. ...
HongJie He, JiaShu Zhang, and Heng-Ming Tai [14] , proposed scheme for image authentication based on wavelet based fragile watermarking in which it finds that whether modification done with the content ...
doi:10.21172/1.81.066
fatcat:qkeqw6fbgbfe5ivxlzet263nai
A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using Integer Wavelet Transform
2009
Journal of Computer Science
Approach: In this study, we proposed a fragile image authentication system with tamper localization in wavelet domain. In this scheme, secret data to be embedded is a logo. ...
Method for authenticating and assuring the integrity of the image is required. ...
CONCLUSION A wavelet-based fragile watermarking scheme for secure image authentication has been presented. ...
doi:10.3844/jcssp.2009.831.837
fatcat:okbdjmno4bhqfgtoaokk7yvobi
Digital Signature Scheme for Image
2012
International Journal of Computer Applications
These approaches include conventional cryptography, fragile and semi-fragile watermarking and digital signatures that are based on the image content. ...
Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. ...
For example: 1.A novel mutual image-based authentication framework [13] has been presented. It consists in a challenge-response scheme based on visual password and image scrambling. ...
doi:10.5120/7708-1012
fatcat:j7ielheatvbbzcv5nrm37hr6aq
Wavelet packets-based digital watermarking for image verification and authentication
2003
Signal Processing
In this paper, we present a novel watermarking scheme to ensure the authenticity of digital images. ...
The image protection is achieved by the insertion of a secret author's identification key in the image wavelet coefficients by their selective quantization. ...
Conclusions and Future Work In this paper, we have presented a technique for digital image authentication based on semi-fragile watermarking. ...
doi:10.1016/s0165-1684(03)00171-3
fatcat:wa54tqtrdjcgriihmqmwnoywmm
« Previous
Showing results 1 — 15 out of 968 results