7,118 Hits in 2.4 sec

Content-Based Watermarking for Image Authentication Using Independent Component Analysis

Latha Parameswaran, K. Anbumani
2008 Informatica (Ljubljana, Tiskana izd.)  
This paper proposes a novel approach to content-based watermarking for image authentication that is based on Independent Component Analysis (ICA).  ...  Frobenius norm of the mixing matrix is adopted as the content-based feature. This is embedded as the watermark in a mid-frequency DCT coefficient of the block.  ...  Many authors have worked on content-based watermarking for image authentication. Li et al.  ... 
dblp:journals/informaticaSI/ParameswaranA08 fatcat:yl3d32kdorg5bmlrxcusqgn66a

A quantization-based semi-fragile watermarking scheme for image content authentication

Xiaojun Qi, Xing Xin
2011 Journal of Visual Communication and Image Representation  
This paper presents a novel semi-fragile watermarking scheme for image content authentication with tampering localization.  ...  The image content authentication starts with extracting watermark using the parity of quantization results from the probe image, where the round operation is used to ensure the semi-fragile property.  ...  Conclusions We present a novel semi-fragile watermarking scheme for image content authentication with tampering localization.  ... 
doi:10.1016/j.jvcir.2010.12.005 fatcat:2dwatibntjf5nhkoeixrbo3gsq

Permutation-based Homogeneous Block Content Authentication for Watermarking

S. Maruthuperumal, G.Rosline Nesa Kumari
2013 International Journal of Image Graphics and Signal Processing  
The proposed Permutation-based Homogeneous Block Content authentication (PHBC) methods develop a secure and excellence strong watermarking algorithm that combines the reward of permutation-based Homogeneous  ...  In modern days, digital watermarking has become an admired technique for hitting data in digital images to help guard against copyright infringement.  ...  Sasi Kiran Varma, Managing Director, Chaitanya group of Institutions for providing necessary Infrastructure. Authors would like to thank the anonymous reviewers for their valuable comments.  ... 
doi:10.5815/ijigsp.2013.02.04 fatcat:47gfmztgfvf2nfbujpp4hhym7m

Content based Public Key Watermarking Scheme for Image Verification and Authentication

Jayashree S.Nair, Annamma Abraham
2014 International Journal of Computer Applications  
General Terms Image watermarking, authentication, content based watermarking Keywords Inter block dependence, digital signature, content authentication, semi fragile watermarking, block wise percentage  ...  The scheme computes a content dependent feature value for each block of DCT coefficients of the original image.  ...  Image authentication can be done using a number of approaches like conventional cryptography, fragile and semi fragile techniques and content based signatures.  ... 
doi:10.5120/16187-4912 fatcat:zl4rdbtxwzbffoqywtd354tx5y

Prediction-based Reversible Watermarking of CT Scan Images for Content Authentication and Copyright Protection

Nisar Ahmed Memon, Ali Alzahrani
2020 IEEE Access  
INDEX TERMS Prediction-based reversible watermarking, authenticity, confidentiality, CT scan medical images, ROI and RONI.  ...  However, when these images are exchanged over public networks like the Internet, two important issues are created: content authentication and copyright protection.  ...  [25] presented a reversible medical image watermarking system for content authentication.  ... 
doi:10.1109/access.2020.2989175 fatcat:qszyp7vr3nbahj6apjrsqtpd4e

A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization

Xiaojun Qi, Xing Xin
2015 Journal of Visual Communication and Image Representation  
presents a singular-value-based semi-fragile watermarking scheme for image content authentication.  ...  It then constructs error maps to compute five authentication measures and performs a three-level process to authenticate image content and localize tampered areas.  ...  Conclusions We present an effective SV-based semi-fragile watermarking scheme for image content authentication with tamper localization.  ... 
doi:10.1016/j.jvcir.2015.05.006 fatcat:tpv6ircgbvblzisdy6iznfceoq

A Feature-Based Digital Image Watermarking for Copyright Protection and Content Authentication

Jen-Sheng Tsai, Win-Bin Huang, Chao-Lieh Chen, Yau-Hwang Kuo
2007 2007 IEEE International Conference on Image Processing  
Moreover, the remainder regions are applied for image authentication by using block-wise fragile watermarking method.  ...  In this paper, a feature-based robust digital image watermarking algorithm is proposed to achieve the goal of image authentication and protection simultaneously.  ...  CONCLUSIONS A robust feature-based image watermarking algorithm for copyright protection and content authentication is proposed.  ... 
doi:10.1109/icip.2007.4379867 dblp:conf/icip/TsaiHCK07 fatcat:ecdlj3gb4zeafp2wbr6yg6i6uy

Multimedia Authentication and Watermarking [chapter]

Bin B. Zhu, Mitchell D. Swanson
2003 Signals and Communication Technology  
This is followed in Section 7.3 with detailed descriptions of the current algorithms for the three types of multimedia authentication: hard or complete authentication, soft authentication, and content-based  ...  People seek for information with integrity and authenticity. This makes detection of illegal manipulations an important issue for digital multimedia.  ...  image for content-based authentication.  ... 
doi:10.1007/978-3-662-05300-3_7 fatcat:xfrvbmvv3rccpn3dc4v3c2jp4i


Nirali Jani
2017 International Journal of Advanced Research in Computer Science  
for image authentication.  ...  Also time obtain for segmentation is less compare to block based method.  ...  Some other block wise and content wise semi-fragile scheme for authentication and tamper finding.  ... 
doi:10.26483/ijarcs.v8i9.4971 fatcat:qrptynsiiveu3fawbtbrjxex6u

Review on watermarking scheme for image authentication and tamper detection

2016 International Journal of Latest Trends in Engineering and Technology  
PL Lin, PW Huang, AW Peng [9] ,proposed a method for image authentication with localization and recovery using fragile block wise and content based watermarking.  ...  HongJie He, JiaShu Zhang, and Heng-Ming Tai [14] , proposed scheme for image authentication based on wavelet based fragile watermarking in which it finds that whether modification done with the content  ... 
doi:10.21172/1.81.066 fatcat:qkeqw6fbgbfe5ivxlzet263nai

Hop Horse-Image Authentication Scheme

Mona A. M. Fouad, Ahmed Mokhtar A. Mansour
2015 International Journal of Multimedia and Ubiquitous Engineering  
The hidden watermark is completely invisible, achieving Peak Signal to Noise Ratio (PSNR) more than 67 decibels (dB) for grayscale images that vary in size and content.  ...  An extensive review of previous work concerning image authentication approaches is presented, showing the need for robust and powerful authentication scheme. 72 Copyright ⓒ 2015 SERSC identical, the image  ...  Both length and content of the watermark is image-based varies from image to image.  ... 
doi:10.14257/ijmue.2015.10.5.08 fatcat:tolqowxjorhijf6ig5jrwi4g2y

On the analysis and design of secure multimedia authentication scheme

Jinwei Wang, Shiguo Lian, Guangjie Liu
2008 2008 Third International Conference on Communications and Networking in China  
The third category is the content-based watermarking authentication schemes in which the watermark is generated by the multimedia content.  ...  The first category is the watermarking authentication schemes in which the watermark is independent of the multimedia content.  ...  Figure 4 : Relation among the authentication sets for the content-independent watermarking fragile authentication scheme Figure 5 : Relation among the authentication sets for the content-independent watermarking  ... 
doi:10.1109/chinacom.2008.4685264 fatcat:faczhmxx45cepibhkctjlwm6la

Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication

Archana Tiwari, Manisha Sharma
2012 Journal of Information Security  
To protect authenticity of images semifragile watermarking is very concerned by researchers because of its important function in multimedia content authentication.  ...  Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents.  ...  Prerequisites for Semifragile Watermark-Based Image Authentication Systems There are certain requirements which are essential for any authentication system; these requirements are discussed here for semifragile  ... 
doi:10.4236/jis.2012.33023 fatcat:eppi6bojjzeolliypmn4u3a6uq

A Survey on Image Authentication Techniques

S. Jothimani, P. Betty
2014 International Journal of Engineering Trends and Technoloy  
Besides, image authentication system requires the main content sensitive.  ...  The traditional cryptographic hash functions, such as MD5 and SHA-1 are used for authentication. However, these hash functions are not suitable for image authentication.  ...  The increasing need for trustworthy distribution of digital multimedia in business, industry, defence etc. has lead to the concept of content-based authentication.  ... 
doi:10.14445/22315381/ijett-v7p271 fatcat:gu4iusl6xnbq5o33dfbcor5cwu

SemiFragile Watermarking Scheme based on Feature in Dwt Domain

Chaitanya Kommini, Kamalesh Ellanti, E. Harshavardhan Chowdary
2011 International Journal of Computer Applications  
., image authentication and tamper localization are achieved by comparing the matrices of extracted content based image with the extracted watermark.  ...  In DWT domain, A novel semi-fragile watermarking is the scheme for the purpose of authenticating the image and also tamper localization.  ...  ., this semi-fragile watermarking must be fragile for content-modifications whereas it must be robust for content-preserving manipulations.  ... 
doi:10.5120/3370-4653 fatcat:cdohojrk6jcjrgh5xbl2djultm
« Previous Showing results 1 — 15 out of 7,118 results