Puhan et al., 2007 - Google Patents
Secure authentication watermarking for localization against the Holliman–Memon attackPuhan et al., 2007
View PDF- Document ID
- 7981256877505145304
- Author
- Puhan N
- Ho A
- Publication year
- Publication venue
- Multimedia Systems
External Links
Snippet
Authentication watermarking schemes using block-wise watermarks for tamper localization are vulnerable to the Holliman–Memon attack. In this paper, we propose a novel method based on the Wong's localization scheme (Proceedings of the IS&T PIC, Portland) to resist …
- 230000004807 localization 0 title abstract description 40
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rey et al. | A survey of watermarking algorithms for image authentication | |
Celik et al. | Hierarchical watermarking for secure image authentication with localization | |
Li | Digital fragile watermarking scheme for authentication of JPEG images | |
Fridrich | Methods for tamper detection in digital images | |
Voyatzis et al. | The use of watermarks in the protection of digital multimedia products | |
Zhu et al. | When seeing isn't believing [multimedia authentication technologies] | |
Voyatzis et al. | Protecting digital image copyrights: a framework | |
Wolfgang et al. | Fragile watermarking using the VW2D watermark | |
US20060242418A1 (en) | Method for ensuring the integrity of image sets | |
Zhou et al. | A semifragile watermark scheme for image authentication | |
Liu et al. | The survey of digital watermarking-based image authentication techniques | |
KR20020066203A (en) | Information processing apparatus and its control method, computer program, and storage medium | |
Chandra et al. | Digital watermarking technique for protecting digital images | |
Ho et al. | Image content authentication using pinned sine transform | |
Katzenbeisser et al. | Securing symmetric watermarking schemes against protocol attacks | |
CN114782238A (en) | Image self-authentication method based on hash function and information hiding | |
Ho et al. | A semi-fragile pinned sine transform watermarking system for content authentication of satellite images | |
Puhan et al. | Secure authentication watermarking for localization against the Holliman–Memon attack | |
Das et al. | Cryptanalysis of correlation-based watermarking schemes using single watermarked copy | |
Puhan et al. | Binary document image watermarking for secure authentication using perceptual modeling | |
Lin et al. | Hierarchical watermarking scheme for image authentication and recovery | |
Lin et al. | Robust digital signature for multimedia authentication | |
Lei et al. | An image watermarking based on multi-level authentication for quick response code | |
Dadkhah et al. | Efficient image authentication and tamper localization algorithm using active watermarking | |
Nyeem et al. | Modelling attacks on self-authentication watermarking |