A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Novel Authentication Scheme for Lossy Compressed Images
2015
International Journal of Security and Its Applications
In this paper, a novel scheme is proposed for watermarking lossy compressed images just before transmission and authenticating them once they are received, away from the core of the compression and de-compression ...
The scheme is also blind, needs no prior information about the original image or the watermark information to authenticate the received image. ...
Inverted scheme retrieves the original image before the watermark is embedded, so that the watermark information or the original image should be known for the receiver. ...
doi:10.14257/ijsia.2015.9.6.29
fatcat:r4zbz4x7svfsfixuucdj4xbuci
Indiscernible Text Digital Watermarking
2017
International Journal of Advanced Research in Computer Science and Software Engineering
Potential applications of digital watermarking include copyright protection, distribution tracing, authentication and conditional-access control. ...
Beyond those for still image compression, video watermarking poses some unique requirements like frame shuffling, inter-frame collusion, etc. ...
Thus, high quality compression is achieved for colored images (20:1 to 25:1) thru JPEG compression in comparison to grayscale images (5:1). ...
doi:10.23956/ijarcsse/sv7i5/0272
fatcat:x5c3kqfbuvcoxftuygbbda43du
Lossless Data Embedding—New Paradigm in Digital Watermarking
2002
EURASIP Journal on Advances in Signal Processing
We present lossless embedding methods for the uncompressed formats (BMP, TIFF) and for the JPEG format. ...
In this paper, we introduce a new paradigm for data embedding in images (lossless data embedding) that has the property that the distortion due to embedding can be completely removed from the watermarked ...
Government is authorized to reproduce and distribute reprints for Governmental purposes not withstanding any copyright notation there on. ...
doi:10.1155/s1110865702000537
fatcat:5edrsqwifnfr5pesghk2nnsnea
Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images
[article]
2011
arXiv
pre-print
This paper proposes a strict authentication watermarking for medical images. In this scheme, we define region of interest (ROI) by taking the smallest rectangle around an image. ...
The JPEG image quality threshold is 60 for the least significant bit embedding. The image quality threshold is increased to 61 for 2nd and 3rd LSB manipulations. ...
Summary and Concluding Remarks A lossless watermarking scheme is proposed that is robust to lossy JPEG compression and at the same time is able to verify the authenticity and integrity of medical images ...
arXiv:1101.5188v1
fatcat:jev5dm5juvbelmx5oxmbjiq5iq
Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique
2007
Journal of digital imaging
For each block, an adaptive robust digital watermarking method combined with the modulo operation is used to hide both the authentication message and the recovery information. ...
In this study, an adaptive robust digital watermarking method combined with the operation of modulo 256 was chosen to achieve information hiding and image authentication. ...
Another invertible authentication method using robust watermarks will be introduced and explained below. ...
doi:10.1007/s10278-007-9011-1
pmid:17393256
pmcid:PMC3043827
fatcat:s3nzwrmehjgi3ngunyqpno3n74
Multimedia Authentication and Watermarking
[chapter]
2003
Signals and Communication Technology
People seek for information with integrity and authenticity. This makes detection of illegal manipulations an important issue for digital multimedia. ...
We first introduce in Section 7.2 the problem issues and general requirements for a multimedia authentication system. ...
[30] [31] [32] have proposed several invertible watermarking schemes of hard image authentication. ...
doi:10.1007/978-3-662-05300-3_7
fatcat:xfrvbmvv3rccpn3dc4v3c2jp4i
Semi-fragile Image Watermarking Using Zernike Moment and Fuzzy C-Means
2006
Proceedings of the 9th Joint Conference on Information Sciences (JCIS)
In order to improve the detection of malicious tampering images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been incidentally distorted. ...
A signature bit for detecting the malicious tampering of an image is generated using the dominant eigenvector. ...
Table. 3 tabulates the bit error rate of the watermarked image compression with JPEG. We can extract the whole watermarks when JPEG quality is 70. ...
doi:10.2991/jcis.2006.304
dblp:conf/jcis/Wu06
fatcat:iwmm7mh6jrgqdorbyi35mekhzi
A new semi-fragile image watermarking with robust tampering restoration using irregular sampling
2007
Signal processing. Image communication
This paper presents a semi-fragile watermarking method for the automatic authentication and restoration of the content of digital images. ...
Semi-fragile watermarks are embedded into the original image, which reflect local malicious tampering on the image. ...
Dan He in Centre for Communication Systems Research, University of Surrey, for his useful discussions and suggestions. ...
doi:10.1016/j.image.2007.03.004
fatcat:jmoznajakvdjrn7p4y2xr7ovd4
Improved Protection Using Self-Recognized Image
english
2015
International Journal of Innovative Research in Computer and Communication Engineering
english
For evaluating the watermarking methods performance it must be concentrate on the robustness of watermarked image quality and restored image quality. ...
The protection of data can be done by several mechanism to secure and achieve authenticity and integrity of data. ...
., in [6] presented an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression. ...
doi:10.15680/ijircce.2015.0301001
fatcat:yc5swpcfzbcmdbkbhoc3d72ywi
An Electronic Bill Encryption Algorithm Based on Multiple Watermark Encryption
2021
Traitement du signal
Digital image watermarking can authenticate and protect images through image processing and cryptography. ...
The encryption of digital watermarks helps to effectively improve the performance of digital watermarking, thereby meeting the needs of bill image authentication in the actual financial system. ...
During digital watermarking, special technology should be adopted to encrypt the watermark information, laying a solid basis for authentication. ...
doi:10.18280/ts.380113
fatcat:g2miinggtnffnkw5qzdrilbspy
Localized lossless authentication watermark (LAW)
2003
Security and Watermarking of Multimedia Contents V
A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions. ...
This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the ...
as invertible or reversible authentication * . ...
doi:10.1117/12.477312
dblp:conf/sswmc/Celik0TS03
fatcat:q6iezzq7wffbheyatjvbcexfra
Locally most-powerful detector for secret key estimation in spread spectrum image steganography
2004
Security, Steganography, and Watermarking of Multimedia Contents VI
Searching for the stego-key
p. 70
Quantitative evaluation of pairs and RS steganalysis
p. 83
Steganalysis with JPEG and GIF images
p. 98
Fast audio watermarking : concepts and realizations
p. ...
Performance bounds on optimal watermark synchronizers p. 827Malicious attacks on media authentication schemes based on invertible watermarks p. 838Evaluating the performance of ST-DM watermarking in nonadditive ...
doi:10.1117/12.521394
dblp:conf/sswmc/TrivediC04
fatcat:nxfcw6hmrvcpthtwevgzkbhioq
An Improved DCT based Image Watermarking Robust Against JPEG Compression and Other Attacks
2017
International Journal of Image Graphics and Signal Processing
information of the image and not affected significantly by the quantization method of JPEG algorithm. ...
Many earlier works have suggested embedding watermark information in the low frequencies of the image to enhance the robustness against JPEG compression because low frequencies hold the most significant ...
In the year 2006, Yuan et.al. proposed a multipurpose color image watermarking algorithm for copyright protection and image authentication [4] . ...
doi:10.5815/ijigsp.2017.09.05
fatcat:dn7srk5x4bd6bbt3ge4br3cwc4
A Survey of Watermarking Algorithms for Image Authentication
2002
EURASIP Journal on Advances in Signal Processing
Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. ...
In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. ...
His research interests currently include image/video watermarking, with a particular emphasis on malicious attacks on watermarking systems and counter-measures, image authentication, and turbo codes. ...
doi:10.1155/s1110865702204047
fatcat:olg5yi3aa5eqnhvl4xpknkulb4
Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran
2014
The Scientific World Journal
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. ...
The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. ...
Acknowledgment The authors would like to thank and acknowledge the IT Research Center for the Holy Quran (NOOR) at Taibah University for their financial support during the academic year 2012/2013 under ...
doi:10.1155/2014/803983
pmid:25028681
pmcid:PMC4060594
fatcat:77uc7yd5jzcjnotdb4qsfgn6yy
« Previous
Showing results 1 — 15 out of 488 results