A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2009; you can also visit the original URL.
The file type is application/pdf
.
Watermarking JBIG2 text region for image authentication
2005
IEEE International Conference on Image Processing 2005
Fig. 1 : A template ranking with all possible 3×3 templates (mirrors, rotations and reverses of each pattern have the same score). ABSTRACT An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, using a secret-key, the message authentication code (MAC) of the image, and somehow inserts MAC into the image itself. The authentication verification is performed using the same
doi:10.1109/icip.2005.1530246
dblp:conf/icip/PamboukianKQ05
fatcat:uxdlnypg3ndibhqzwncpjvcc2i