A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Fragile Watermarking Scheme Based CRC Checksum and Public Key Cryptosystem for RGB Color Image Authentication
[chapter]
2012
Lecture Notes in Computer Science
In this paper, we propose a novel fragile watermarking scheme based CRC checksum and public key cryptosystem for RGB color image authentication. ...
These data, in particular the images should be protected from tampering. The solution is the use of fragile watermarking. ...
We are grateful to Dr Redha BENZID and Dr Rachid SEGHIR for early stimulating discussion and for their valuable comments and suggestions which lead to substantial improvements of this paper. ...
doi:10.1007/978-3-642-31254-0_36
fatcat:rl43lqegyrfkblqawrjla5vzdq
Secure Sharing of Medical Information in Watermarked Image through Telemedicine using PKI Technique
2014
International Journal of Computer Applications
With the patient information the medical image is protected through Public key cryptography in a secure manner. Compared to the previous system, the proposed technique is more efficient. ...
Digital watermarks are used to verify the authenticity of the carrier signal for the identity of the owners. ...
For authentication and integrity, RSA is a potential method for medical images. ...
doi:10.5120/17658-8473
fatcat:u43aunla3nbhjkxjter4hvjgje
Attack Detection Through Image Adaptive Self Embedding Watermarking
2007
Zenodo
Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. ...
Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. ...
Uniqueness of Authenticator Watermark Generation:
Different values of k should produce distinct
authenticator watermarks for the same host image X , to
guarantee key-based security of a
W .
3. ...
doi:10.5281/zenodo.1080775
fatcat:tddrsqxa5fhzbmkb4uq7pn5fgq
Embedded Semi-Fragile Signature Based Scheme For Ownership Identification And Color Image Authentication With Recovery
2008
Zenodo
In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. ...
The color image is first transformed from RGB to YST color space exclusively designed for watermarking. ...
Abstract-In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. ...
doi:10.5281/zenodo.1073063
fatcat:wvddktt2izd3bklyxzb57llali
The security flaws in some authentication watermarking schemes
2003
2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698)
In this paper we analyze three authentication watermarking schemes and point out their security flaws. The first scheme is the color authentication scheme in [1]. ...
The scheme is not secure in the sense that as long as an attacker obtains one authenticated image, he is able to forge authentic images without the secret key. ...
WONG'S AUTHENTICATION SCHEME Wong et. al [2] described two authentication watermarking schemes: a secret key scheme and a public key scheme. ...
doi:10.1109/icme.2003.1221661
dblp:conf/icmcs/WuBX03
fatcat:to5rptkcwzditb4x7llkpp3oaq
A Fragile Watermarking Scheme For Color Image Authentication
2008
Zenodo
In this paper, a fragile watermarking scheme is proposed for color image specified object-s authentication. ...
The T channel corresponds to the chrominance component of a color image andYS  T , therefore selected for embedding the watermark. ...
In this paper we presented a fragile watermarking scheme, designed for color image particular object's authentication. ...
doi:10.5281/zenodo.1055236
fatcat:pf2jpk4ozbhmbckrj6g7byq2di
A Semi-Fragile Watermarking Scheme For Color Image Authentication
2008
Zenodo
In this paper, a semi-fragile watermarking scheme is proposed for color image authentication. ...
For watermark distribution 2DTorus Automorphism is implemented using a private key to have a secure mapping of blocks. ...
The given color image is first transformed from RGB to YST color space suitable for watermarking based applications. ...
doi:10.5281/zenodo.1061778
fatcat:alz5rgnzw5bmblvb3ody5htkay
A Semi-Fragile Signature Based Scheme For Ownership Identification And Color Image Authentication
2008
Zenodo
In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies. ...
The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications. ...
The color image is first transformed from RGB to YST color space, exclusively designed for watermarking based applications. ...
doi:10.5281/zenodo.1071412
fatcat:xhkau4iafzafra2rikkqgspywi
A new public-key authentication watermarking for binary document images resistant to parity attacks
2005
IEEE International Conference on Image Processing 2005
Recent papers have proposed some cryptography-based AWTs for binary and halftone images, but none of them seems to be well-suited for public-key authentication of binary document images. ...
Many of the previous public-key AWTs for binary images can be assaulted by "parity attacks." ...
A cryptography-based AWT for dispersed-dot halftone images named AWST (Authentication Watermarking by Self Toggling) has been recently proposed [9] . ...
doi:10.1109/icip.2005.1530245
dblp:conf/icip/Kim05
fatcat:v3ql6cb7gbagnfcaqqizfvthyq
A Quantum Watermark Protocol
2012
International Journal of Theoretical Physics
In this paper, a watermark strategy for quantum images is proposed based on flexible representation for quantum images (FRQI). ...
It is impossible for anyone except the copyrighter to clear off or extract the watermark images. ...
Conclusion In this paper, a watermarking algorithm for quantum images is proposed based on FRQI. ...
doi:10.1007/s10773-012-1354-9
fatcat:bd7t6mbhtbdjfesvodppl4tqqu
Pattern-Based Fragile Watermarking For Color Images
2010
Zenodo
Publication in the conference proceedings of EUSIPCO, Aalborg, Denmark, 2010 ...
[6] presented the block-wise and content-based watermarking method for image authentication and recovery. ...
However, a few attempts have been made to color image authentication. The color image watermarking schemes for authentication that have been relatively developed can be found in [9] - [12] . ...
doi:10.5281/zenodo.42117
fatcat:7d2mqsc3qje4dmal3owy2arxbe
Methods for image authentication: a survey
2007
Multimedia tools and applications
The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication. ...
Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. ...
Public key systems, also called asymmetric systems, use a pair of keys: a public key and a private key. ...
doi:10.1007/s11042-007-0154-3
fatcat:wwtvlpeyjnck3pj5gcpxakvhfq
Security on Fragile and Semi-fragile Watermarks Authentication
2010
International Journal of Computer Applications
Ensuring digital image security has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. ...
Here we have identified the attacks which frequently attacks some very well known fragile and semifragile watermarking techniques.. General Terms Security, Watermarking and Authentication. ...
The watermarking is done for each block separately. Wong described two versions of this algorithm: private key and public key versions. ...
doi:10.5120/721-1013
fatcat:7c646ajmbjgnvn7njhyn26hhfu
Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images
2004
IEEE Transactions on Image Processing
This paper proposes an approach for the combined image authentication and compression of color images by making use of a digital watermarking and data hiding framework. ...
The digital watermark is comprised of two components: a soft-authenticator watermark for authentication and tamper assessment of the given image, and a chrominance watermark employed to improve the efficiency ...
or intentional distortions in the CH image distribution chain), using the secret key (4) 5) The recovery function, , which employs for authentication and color recovery of the image (5) where is a key ...
doi:10.1109/tip.2003.821552
pmid:15376933
fatcat:hywpl3o72nhtblong43yqjlu24
Cryptanalysis of the Yeung–Mintzer fragile watermarking technique
2002
Journal of Electronic Imaging (JEI)
A number of authentication techniques based on digital watermarks have been proposed in the literature. ...
The attack works without knowledge of the binary watermark inserted in the image, provided the attacker has access to a few images that have been watermarked with the same secret key (insertion function ...
The former employs public key techniques to generate a signature for a message that can be verified by anyone having knowledge of the public key (for example, see [3] ). ...
doi:10.1117/1.1459449
fatcat:6gt4n6rpobe2jbb72epco3wuci
« Previous
Showing results 1 — 15 out of 1,889 results