488 Hits in 3.6 sec

A Novel Authentication Scheme for Lossy Compressed Images

Mona A. M. Fouad, Ahmed Mokhtar A. Mansour
2015 International Journal of Security and Its Applications  
In this paper, a novel scheme is proposed for watermarking lossy compressed images just before transmission and authenticating them once they are received, away from the core of the compression and de-compression  ...  The scheme is also blind, needs no prior information about the original image or the watermark information to authenticate the received image.  ...  Inverted scheme retrieves the original image before the watermark is embedded, so that the watermark information or the original image should be known for the receiver.  ... 
doi:10.14257/ijsia.2015.9.6.29 fatcat:r4zbz4x7svfsfixuucdj4xbuci

Indiscernible Text Digital Watermarking

Lakshman Ji, Ravi Asthana
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Potential applications of digital watermarking include copyright protection, distribution tracing, authentication and conditional-access control.  ...  Beyond those for still image compression, video watermarking poses some unique requirements like frame shuffling, inter-frame collusion, etc.  ...  Thus, high quality compression is achieved for colored images (20:1 to 25:1) thru JPEG compression in comparison to grayscale images (5:1).  ... 
doi:10.23956/ijarcsse/sv7i5/0272 fatcat:x5c3kqfbuvcoxftuygbbda43du

Lossless Data Embedding—New Paradigm in Digital Watermarking

Jessica Fridrich, Miroslav Goljan, Rui Du
2002 EURASIP Journal on Advances in Signal Processing  
We present lossless embedding methods for the uncompressed formats (BMP, TIFF) and for the JPEG format.  ...  In this paper, we introduce a new paradigm for data embedding in images (lossless data embedding) that has the property that the distortion due to embedding can be completely removed from the watermarked  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes not withstanding any copyright notation there on.  ... 
doi:10.1155/s1110865702000537 fatcat:5edrsqwifnfr5pesghk2nnsnea

Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) for Medical Images [article]

Jasni Mohamad Zain
2011 arXiv   pre-print
This paper proposes a strict authentication watermarking for medical images. In this scheme, we define region of interest (ROI) by taking the smallest rectangle around an image.  ...  The JPEG image quality threshold is 60 for the least significant bit embedding. The image quality threshold is increased to 61 for 2nd and 3rd LSB manipulations.  ...  Summary and Concluding Remarks A lossless watermarking scheme is proposed that is robust to lossy JPEG compression and at the same time is able to verify the authenticity and integrity of medical images  ... 
arXiv:1101.5188v1 fatcat:jev5dm5juvbelmx5oxmbjiq5iq

Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique

Jeffery H. K. Wu, Ruey-Feng Chang, Chii-Jen Chen, Ching-Lin Wang, Ta-Hsun Kuo, Woo Kyung Moon, Dar-Ren Chen
2007 Journal of digital imaging  
For each block, an adaptive robust digital watermarking method combined with the modulo operation is used to hide both the authentication message and the recovery information.  ...  In this study, an adaptive robust digital watermarking method combined with the operation of modulo 256 was chosen to achieve information hiding and image authentication.  ...  Another invertible authentication method using robust watermarks will be introduced and explained below.  ... 
doi:10.1007/s10278-007-9011-1 pmid:17393256 pmcid:PMC3043827 fatcat:s3nzwrmehjgi3ngunyqpno3n74

Multimedia Authentication and Watermarking [chapter]

Bin B. Zhu, Mitchell D. Swanson
2003 Signals and Communication Technology  
People seek for information with integrity and authenticity. This makes detection of illegal manipulations an important issue for digital multimedia.  ...  We first introduce in Section 7.2 the problem issues and general requirements for a multimedia authentication system.  ...  [30] [31] [32] have proposed several invertible watermarking schemes of hard image authentication.  ... 
doi:10.1007/978-3-662-05300-3_7 fatcat:xfrvbmvv3rccpn3dc4v3c2jp4i

Semi-fragile Image Watermarking Using Zernike Moment and Fuzzy C-Means

Yeh-Kuang Wu
2006 Proceedings of the 9th Joint Conference on Information Sciences (JCIS)  
In order to improve the detection of malicious tampering images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been incidentally distorted.  ...  A signature bit for detecting the malicious tampering of an image is generated using the dominant eigenvector.  ...  Table. 3 tabulates the bit error rate of the watermarked image compression with JPEG. We can extract the whole watermarks when JPEG quality is 70.  ... 
doi:10.2991/jcis.2006.304 dblp:conf/jcis/Wu06 fatcat:iwmm7mh6jrgqdorbyi35mekhzi

A new semi-fragile image watermarking with robust tampering restoration using irregular sampling

Xunzhan Zhu, Anthony T.S. Ho, Pina Marziliano
2007 Signal processing. Image communication  
This paper presents a semi-fragile watermarking method for the automatic authentication and restoration of the content of digital images.  ...  Semi-fragile watermarks are embedded into the original image, which reflect local malicious tampering on the image.  ...  Dan He in Centre for Communication Systems Research, University of Surrey, for his useful discussions and suggestions.  ... 
doi:10.1016/j.image.2007.03.004 fatcat:jmoznajakvdjrn7p4y2xr7ovd4

Improved Protection Using Self-Recognized Image

Sanchit Shrikant Mahajan, Prof. Pratima Bhati
2015 International Journal of Innovative Research in Computer and Communication Engineering  
For evaluating the watermarking methods performance it must be concentrate on the robustness of watermarked image quality and restored image quality.  ...  The protection of data can be done by several mechanism to secure and achieve authenticity and integrity of data.  ...  ., in [6] presented an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression.  ... 
doi:10.15680/ijircce.2015.0301001 fatcat:yc5swpcfzbcmdbkbhoc3d72ywi

An Electronic Bill Encryption Algorithm Based on Multiple Watermark Encryption

Chuan Lin, Xinpeng Xu
2021 Traitement du signal  
Digital image watermarking can authenticate and protect images through image processing and cryptography.  ...  The encryption of digital watermarks helps to effectively improve the performance of digital watermarking, thereby meeting the needs of bill image authentication in the actual financial system.  ...  During digital watermarking, special technology should be adopted to encrypt the watermark information, laying a solid basis for authentication.  ... 
doi:10.18280/ts.380113 fatcat:g2miinggtnffnkw5qzdrilbspy

Localized lossless authentication watermark (LAW)

Mehmet U. Celik, Gaurav Sharma, A. Murat Tekalp, Eli S. Saber, Edward J. Delp III, Ping W. Wong
2003 Security and Watermarking of Multimedia Contents V  
A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions.  ...  This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the  ...  as invertible or reversible authentication * .  ... 
doi:10.1117/12.477312 dblp:conf/sswmc/Celik0TS03 fatcat:q6iezzq7wffbheyatjvbcexfra

Locally most-powerful detector for secret key estimation in spread spectrum image steganography

Shalin P. Trivedi, Rajarathnam Chandramouli, Edward J. Delp III, Ping W. Wong
2004 Security, Steganography, and Watermarking of Multimedia Contents VI  
Searching for the stego-key p. 70 Quantitative evaluation of pairs and RS steganalysis p. 83 Steganalysis with JPEG and GIF images p. 98 Fast audio watermarking : concepts and realizations p.  ...  Performance bounds on optimal watermark synchronizers p. 827Malicious attacks on media authentication schemes based on invertible watermarks p. 838Evaluating the performance of ST-DM watermarking in nonadditive  ... 
doi:10.1117/12.521394 dblp:conf/sswmc/TrivediC04 fatcat:nxfcw6hmrvcpthtwevgzkbhioq

An Improved DCT based Image Watermarking Robust Against JPEG Compression and Other Attacks

Soumik Das, Monalisa Banerjee, Atal Chaudhuri
2017 International Journal of Image Graphics and Signal Processing  
information of the image and not affected significantly by the quantization method of JPEG algorithm.  ...  Many earlier works have suggested embedding watermark information in the low frequencies of the image to enhance the robustness against JPEG compression because low frequencies hold the most significant  ...  In the year 2006, Yuan proposed a multipurpose color image watermarking algorithm for copyright protection and image authentication [4] .  ... 
doi:10.5815/ijigsp.2017.09.05 fatcat:dn7srk5x4bd6bbt3ge4br3cwc4

A Survey of Watermarking Algorithms for Image Authentication

Christian Rey, Jean-Luc Dugelay
2002 EURASIP Journal on Advances in Signal Processing  
Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication.  ...  In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme.  ...  His research interests currently include image/video watermarking, with a particular emphasis on malicious attacks on watermarking systems and counter-measures, image authentication, and turbo codes.  ... 
doi:10.1155/s1110865702204047 fatcat:olg5yi3aa5eqnhvl4xpknkulb4

Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

Mohammed S. Khalil, Fajri Kurniawan, Muhammad Khurram Khan, Yasser M. Alginahi
2014 The Scientific World Journal  
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images.  ...  The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark.  ...  Acknowledgment The authors would like to thank and acknowledge the IT Research Center for the Holy Quran (NOOR) at Taibah University for their financial support during the academic year 2012/2013 under  ... 
doi:10.1155/2014/803983 pmid:25028681 pmcid:PMC4060594 fatcat:77uc7yd5jzcjnotdb4qsfgn6yy
« Previous Showing results 1 — 15 out of 488 results