4,486 Hits in 3.9 sec

A new public-key authentication watermarking for binary document images resistant to parity attacks

Hae Yong Kim
2005 IEEE International Conference on Image Processing 2005  
This paper proposes a new AWT for binary document images that can detect any modification of the watermarked document, even a single pixel flipping.  ...  Recent papers have proposed some cryptography-based AWTs for binary and halftone images, but none of them seems to be well-suited for public-key authentication of binary document images.  ...  PREVIOUS TECHNIQUES As we said above, there are many data-hiding schemes for binary images in the literature.  ... 
doi:10.1109/icip.2005.1530245 dblp:conf/icip/Kim05 fatcat:v3ql6cb7gbagnfcaqqizfvthyq

An Effective Authentication Method for Document Type Color Images with Data Repairing Capabilities

Ashwini V.Kurzekar, A. R. Mahajan
2014 International Journal of Computer Applications  
This is new authentication scheme based on the secret sharing method with a data repair capability for document type color images via the use of portable network graphics (PNG) image.  ...  In the process of image authentication, the block in an image is marked as a tampered if the authentication signal computed from the current block content of a binary image does not match that extracted  ...  A new binary image authentication method with small distortion and low false negative rates system is proposed.  ... 
doi:10.5120/17113-7377 fatcat:ocvvkznj6nbi5ikzoljyyuuvbu

Authentication of grayscale document images using shamir secret sharing scheme

Mrs.G Niranjana, Ms.K.Siva Shalini
2014 IOSR Journal of Computer Engineering  
This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme  ...  In additional image transformed in to a stego-image in the PNG format with an additional alpha channel for transmission on networks.  ...  In this paper, we propose a new Blind authentication method for binary images with good balance between the mutually conflicting goals of distortion reduction and security enhancement.  ... 
doi:10.9790/0661-16277579 fatcat:julm2j4eozdkdpcoa7fsfupfmi

Visual Secret Sharing Scheme Using Encrypting Multiple Images

A. Shvetha, S. Rathnamala, M. V. Meenumathi
2021 Zenodo  
Here we use a data hiding key for the purpose of compressing the least significant bits of the encrypted image in order to generate space for certain additional data.  ...  Even if the image content is unknown, the recipient can extract the encrypted image which contains additional data with the data hiding key.  ...  Kot and Jun Cheng have proposed a paper entitled "Secure Data Hiding in Binary Document Images for Authentication". This paper presents an algorithm for data hiding for binary documents images.  ... 
doi:10.5281/zenodo.4739451 fatcat:ymfwmdauefhx5nvm3rlxx5xmma

An Extensive Review on Digital Image Watermarking

Prashant Yadav, Rajesh Kumar Rai
2015 International Journal of Computer Applications  
after decryption, which makes it possible for hackers and adversaries to illegally redistribute or manipulate the content.  ...  Ease of transferring and broadcasting over networks, higher quality and durability, online/offline easy editing, copying, and simplicity of archiving or storing are just a few advantages of digital multimedia  ...  Binary image watermarking with pixel flipping approach is a challenging problem, because flipping the black and white pixels in such simple images can bring noticeable visual distortion.  ... 
doi:10.5120/20662-3375 fatcat:nnf6kfz7grdrvcgo35empbdkmu

ROI-based reversible watermarking scheme for ensuring the integrity and authenticity of DICOM MR images

Asaad F. Qasim, Rob Aspin, Farid Meziane, Peter Hogg
2018 Multimedia tools and applications  
Experimental results show that the proposed method, whilst fully reversible, can also realize a watermarked image with low degradation for reasonable and controllable embedding capacity.  ...  This is fulfilled by concealing the data into 'smooth' regions inside the ROI and through the elimination of the large location map required for extracting the watermark and retrieving the original image  ...  Acknowledgements We would like to thank the ministry of higher education and scientific research (Iraq), for providing scholarship support to the first author of this research paper.  ... 
doi:10.1007/s11042-018-7029-7 fatcat:rcrvl66itnhw7kliu46zok5kc4

Public Key Watermarking for Reversible Image Authentication

Sang-kwang Lee, Young-ho Suh, Yo-sung Ho
2006 2006 International Conference on Image Processing  
In this paper, we propose a new public key watermarking scheme for reversible image authentication where if the image is authentic, the distortion due to embedding can be completely removed from the watermarked  ...  This technique utilizes histogram characteristics of the difference image and modifies pixel values slightly to embed more data than other lossless data hiding algorithm.  ...  CONCLUSIONS In this paper, a new watermarking-based image authentication technique is presented. The technique provides low distortion, high embedding capacity, and lossless data hiding.  ... 
doi:10.1109/icip.2006.312690 dblp:conf/icip/LeeSH06 fatcat:vcxpkkn23jd5hpzswdyjpao4z4

New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks [chapter]

Sergio Vicente Denser Pamboukian, Hae Yong Kim
2005 Lecture Notes in Computer Science  
However, it seems that no AWT for JBIG2 resistant to parity attacks has ever been proposed. This paper proposes a new data-hiding method to embed information in the text region of JBIG2 files.  ...  An authentication watermark is a hidden data inserted into an image that allows detecting any alteration made in the image.  ...  Acknowledgements The authors would like to thank FAPESP and CNPq for the partial financial supports of this work under grants 2003/13752-9 and 305065/2003-3, respectively. References  ... 
doi:10.1007/11551492_22 fatcat:xhbtcdc6kzhfre6lb64owept6i

Reversiblee Image Authentication Based on Watermarking

Sang-kwang Lee, Young-ho Suh, Yo-sung Ho
2006 2006 IEEE International Conference on Multimedia and Expo  
In this paper, we propose a new reversible image authentication technique based on watermarking where if the image is authentic, the distortion due to embedding can be completely removed from the watermarked  ...  This technique utilizes histogram characteristics of the difference image and modifies pixel values slightly to embed more data than other lossless data hiding algorithm.  ...  CONCLUSIONS In this paper, a new watermarking-based image authentication technique is presented. The technique provides low distortion, high embedding capacity, and lossless data hiding.  ... 
doi:10.1109/icme.2006.262782 dblp:conf/icmcs/LeeSH06 fatcat:kc7k37mzqzf7ffvqrsk2b6otkm

A Survey on Fragile Digital Watermarking

2016 International Journal of Science and Research (IJSR)  
detection, multiple watermarking etc., by devising new schemes and algorithms.  ...  But still there is a chance to analyse and determine the requirement of a watermarking scheme with respect to the attributes like; fidelity and capacity in the areas like content based watermarking, tamper  ...  Further this algorithm is an extension of an existing data hiding scheme which is proposed for binary images. The proposed algorithm shows that a very high data payload to fidelity trade-off.  ... 
doi:10.21275/v5i4.nov163126 fatcat:qlbqiuhqa5du5nuwzyscmlkqqe

Reversible Data Hiding and Reversible Authentication Watermarking for Binary Images

S.V.D. Pamboukian, H.Y. Kim
2008 Journal of Communication and Information Systems  
Data hiding is a technique used to embed a sequence of bits in a host image with small visual deterioration and the means to extract it afterwards.  ...  Several reversible data hiding techniques have been developed but very few of them are appropriate for binary images. This paper proposes a reversible data hiding technique for binary images.  ...  CONCLUSIONS We have presented a reversible data hiding for binary images and used it to reversibly authenticate binary images.  ... 
doi:10.14209/jcis.2008.4 fatcat:rn7rq2qlsbendpor5gu5mrdcvu

New Approach for Reversible Data Hiding Using Visual Cryptography

Shruti M. Rakhunde, Archana A. Nikose
2014 2014 International Conference on Computational Intelligence and Communication Networks  
This scheme applies a method of vacating the room for data prior to the image encryption used to hide the secret data.  ...  Data hiding are a group of techniques used to put a secure data in a host media with small deterioration in host and the means to extract the secure data afterwards.  ...  Thus proposed scheme provides a completely new framework for reversible data hiding. Here in this approach we have used a new technique for reserving room before encryption of image.  ... 
doi:10.1109/cicn.2014.180 fatcat:7bszxdopwbgjdobjyze2enpnmq

Enhancing Security of Image by Steganography using Reversible Texture Synthesis

Aparna Vinod, Sony P
2017 International Journal of Engineering Research and  
The texture synthesis process produces an arbitrary large and similar looking new texture from a small texture image.  ...  Steganography is a method of information hiding. In this paper, introduce a novel approach for enhancing the security of an image by steganography using reversible texture synthesis.  ...  In Reversible Data Hiding in Encrypted Image [4] method provide novel reversible data hiding scheme for encrypted image, which is made up of image encryption, data embedding and data-extraction image-recovery  ... 
doi:10.17577/ijertv6is080151 fatcat:xiwfpvqzivgm3mswun7tf43sx4

Difference histogram analysis of several reversible data hiding schemes

Hong Zhao, Hongxia Wang, Muhammad Khurram Khan
2009 2009 Asia Pacific Conference on Postgraduate Research in Microelectronics & Electronics (PrimeAsia)  
In this paper, we experimental investigate if the current reversible data hiding schemes are detectable.  ...  Furthermore, the difference between the horizontal and the vertical difference histogram of natural image is much less than that of the watermarked image.  ...  Comparision We randomly select 1,000 images from our image database. Half of them are used to embed with random binary bits with the three reversible data hiding algorithms.  ... 
doi:10.1109/primeasia.2009.5397411 fatcat:expi64c7kjhpnamhikoclxfrpi

Reversible Data Hiding in Binary Images by Symmetrical Flipping Degree Histogram Modification [chapter]

Xiaolin Yin, Wei Lu, Wanteng Liu, Junhong Zhang
2019 Biological Responses to Nanoscale Particles  
The visual qualities are limited in marked images by using the existing reversible data hiding (RDH) methods.  ...  First, the SFD which are a score to measure the distance between the pixels in the block is obtained. The better the visual quality a block has which is with a small SFD.  ...  Data hiding [1] [2] [3] , a practice of digital authentication [4] , is a technique for embedding secret messages into cover media.  ... 
doi:10.1007/978-3-030-16946-6_73 fatcat:cwd7rloiarafdokw7nztsx2m6u
« Previous Showing results 1 — 15 out of 4,486 results