205 Hits in 3.0 sec

Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication

Archana Tiwari, Manisha Sharma
2012 Journal of Information Security  
The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication using semifragile watermarking.  ...  Over the past few years, watermarking has emerged as the leading candidate to solve problems of ownership and content authentications for digital multimedia documents.  ...  In addition to comparison based on image quality matrix, some observation is also suggested to efficiently develop an efficient semifragile watermarking algorithm for image authentication.  ... 
doi:10.4236/jis.2012.33023 fatcat:eppi6bojjzeolliypmn4u3a6uq

A recent survey of self-embedding fragile watermarking scheme for image authentication with recovery capability

Lusia Rakhmawati, Wirawan Wirawan, Suwadi Suwadi
2019 EURASIP Journal on Image and Video Processing  
fragile watermarking scheme.  ...  Once a picture which has been inserted with a watermark is modified by other users, it can be used for tamper detection and recovery images.  ...  Availability of data and materials Please contact author for data requests. Competing interests The authors declare that they have no competing interests.  ... 
doi:10.1186/s13640-019-0462-3 fatcat:cu5pfsivmbh5plqwpbaudxq6fq

Semifragile Watermarking Schemes for Image Authentication- A Survey

Archana Tiwari, Manisha Sharma
2012 International Journal of Computer Network and Information Security  
To project authenticity of images semi fragile watermarking is very concerned by researchers because of its important function in content authentication.  ...  Finally some observations are given based on literature survey of algorithms and techniques of semifragile watermarking techniques  ...  The digital-signature-based image authentication scheme computes the digest for an image and stores it in a separate file.  ... 
doi:10.5815/ijcnis.2012.02.07 fatcat:erve72akj5g4flymokbjirrsze

Blind Robust and Self-Embedding Fragile Image Watermarking for Image Authentication and Copyright Protection with Recovery Capability

Lusia Rakhmawati, Institut Teknologi Sepuluh Nopember, Suwadi Suwadi, Wirawan Wirawan, Institut Teknologi Sepuluh Nopember, Institut Teknologi Sepuluh Nopember
2020 International Journal of Intelligent Engineering and Systems  
domain for authenticating and restoring digital image content.  ...  The robust watermarking utilizes a single watermark using the discrete cosine transform (DCT) domain for copyright protection, while the fragile scheme utilizes two self-embedding watermarks in a spatial  ...  In [20] present an effective singular values (SV)-based semi-fragile watermarking scheme for image content authentication with tamper localization but it could not perform recovery of the  ... 
doi:10.22266/ijies2020.1031.18 fatcat:x7v33awzpjhcpjrezlvvhi3tue

A Self-Recovery Fragile Image Watermarking with Variable Watermark Capacity

Chengyou Wang, Heng Zhang, Xiao Zhou
2018 Applied Sciences  
Currently, the watermark capacity of most self-recovery fragile image watermarking schemes is fixed.  ...  In this paper, a self-recovery fragile image watermarking with variable watermark capacity is proposed.  ...  In [33] , Singh, D. and Singh, S.K. proposed a DCT-based self-recovery fragile watermarking method.  ... 
doi:10.3390/app8040548 fatcat:5oixruqi5ncdjnu6foyqrcp6hi

Review on watermarking scheme for image authentication and tamper detection

2016 International Journal of Latest Trends in Engineering and Technology  
Xiumei Qiao , Rongrong Ni and Yao Zhao [20] proposed fragile watermarking scheme for image authentication based on superpixel segmentation mechanism.  ...  HongJie He, JiaShu Zhang, and Heng-Ming Tai [14] , proposed scheme for image authentication based on wavelet based fragile watermarking in which it finds that whether modification done with the content  ... 
doi:10.21172/1.81.066 fatcat:qkeqw6fbgbfe5ivxlzet263nai

A Semi-Fragile Blind Watermarking Scheme for Color Images Based on Visual Cryptography and Discrete Cosine Transform

Xiaodan Jiang, Zheming Lu, Xiajun Ding
2017 International Journal of Innovative Computing, Information and Control  
This paper presents a semi-fragile blind watermarking scheme for color images based on Visual Cryptography (VC) and Discrete Cosine Transform (DCT).  ...  Firstly, the binary watermark image is separated into two shares, i.e., the public share and the private share, by using the VC technique.  ...  This scheme is suitable for some applications that require accurate watermark information restoration and require semi-fragile blind watermarking.  ... 
doi:10.24507/ijicic.13.05.1709 fatcat:wwylcxwcgbgcppghluwwps7zbm

Digital steganography and watermarking for digital images: a review of current research directions

Oleg O. Evsutin, Anna S. Melman, Roman V. Meshcheryakov
2020 IEEE Access  
Next, we review works demonstrating current trends in the development of methods and algorithms for data hiding in digital images.  ...  To solve such kind of problems, methods of steganography and watermarking are designed that implement embedding in digital objects hidden information sequences for various purposes.  ...  The work [80] proposes a fragile watermarking scheme for color image tampering detection and self-recovery.  ... 
doi:10.1109/access.2020.3022779 fatcat:dgmubtjr75alpmlkdewpvd5scq

Intelligent Watermarking Scheme for image Authentication and Recovery

Rafi Ullah, Hani Ali
2017 International Journal of Advanced Computer Science and Applications  
In this paper, we are proposing two independent watermarks, one for image recovery and the other for authentication.  ...  Experimental results show that the semi-fragility of the watermarks makes the proposed scheme tolerant of JPEG lossy compression and it locates the tampered regions accurately.  ...  Semi-Fragile Semi-Fragile Sub-Sampling based Fragile Semi-Fragile Section 3 Recovery after Compression NO YES YES (After compression, the restored image is highly degraded) NO NO  ... 
doi:10.14569/ijacsa.2017.080527 fatcat:a45kncohzbdppa3ftwvesdolrm

Hardware Implementation of a Digital Watermarking System Using 3d Dct

Mohammad Riyas, Umesh A.C
2014 IOSR Journal of Electrical and Electronics Engineering  
In this thesis, I present a secure, low power and low hardware video watermarking system that inserts an invisible semi-fragile watermark into the video stream for real-time surveillance video authentication  ...  Hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and  ...  The existing semi fragile watermarking scheme for video streams with hardware architecture was done using hybrid DCT coding scheme for data compression.  ... 
doi:10.9790/1676-096299108 fatcat:imsmxi5fpbdgjdmhjccdrf6pmq

Improved Protection Using Self-Recognized Image

Sanchit Shrikant Mahajan, Prof. Pratima Bhati
2015 International Journal of Innovative Research in Computer and Communication Engineering  
For evaluating the watermarking methods performance it must be concentrate on the robustness of watermarked image quality and restored image quality.  ...  The protection of data can be done by several mechanism to secure and achieve authenticity and integrity of data.  ...  To extend the variety of cover images and for the sake of repeated usage, they over a lossless data hiding scheme for DCT-based compressed images.  ... 
doi:10.15680/ijircce.2015.0301001 fatcat:yc5swpcfzbcmdbkbhoc3d72ywi

A novel image restoration scheme based on structured side information and its application to image watermarking

Hui Wang, Anthony T.S. Ho, Shujun Li
2014 Signal processing. Image communication  
We also tested the robustness of the image restoration method when it is applied to a self-restoration watermarking scheme and the experimental results showed that it is moderately robust to errors in  ...  Different from existing image restoration methods for similar types of SSI, the proposed method minimizes image discontinuity according to a relaxed definition of smoothness based on a 3 × 3 averaging  ...  [13] proposed a semi-fragile watermarking scheme for image restoration based on halftoning.  ... 
doi:10.1016/j.image.2014.05.001 fatcat:dumjfdwqc5dd7eslbstnvrluhe

Image Authentication Based on Watermarking Approach: Review

Basna Mohammed Salih Hasan, Siddeeq Y. Ameen, Omer Mohammed Salih Hasan
2021 Asian Journal of Research in Computer Science  
for improving the performance of watermark techniques.  ...  Watermarking of a digital image is a mechanism by which the watermark is embedded in multimedia and the image of the watermark is retrieved or identified in a multimedia entity.  ...  To guarantee the integrity and accuracy of fMRI images, a watermarking scheme has been proposed which introduces a fragile reversible watermark scheme to characterize images of fMRI which are free of any  ... 
doi:10.9734/ajrcos/2021/v9i330224 fatcat:ng5kkpahcnah3p5iysh4m7egbu

Review on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images

2017 Future Internet  
The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot.  ...  In this paper, semi-fragile watermarking algorithms for image authentication are surveyed.  ...  engine, and the scheme performs well in terms of invisibility, complexity, compression ratio, adaptability, scalability, and energy efficiency.  ... 
doi:10.3390/fi9040056 fatcat:5f7oqe22erddrofad2dqx27chu

Multimedia Authentication and Watermarking [chapter]

Bin B. Zhu, Mitchell D. Swanson
2003 Signals and Communication Technology  
This is followed in Section 7.3 with detailed descriptions of the current algorithms for the three types of multimedia authentication: hard or complete authentication, soft authentication, and content-based  ...  People seek for information with integrity and authenticity. This makes detection of illegal manipulations an important issue for digital multimedia.  ...  s quantization-based robust and fragile watermarking schemes [38, 40] .  ... 
doi:10.1007/978-3-662-05300-3_7 fatcat:xfrvbmvv3rccpn3dc4v3c2jp4i
« Previous Showing results 1 — 15 out of 205 results