Hernandez et al., 2011 - Google Patents
A fragile watermarking scheme for image authentication in mobile devicesHernandez et al., 2011
- Document ID
- 8415959818626401789
- Author
- Hernandez C
- Torres-Huitzi C
- Publication year
- Publication venue
- 2011 8th International Conference on Electrical Engineering, Computing Science and Automatic Control
External Links
Snippet
With the rapid development of Internet, wireless communication and the camera-capable portable devices, digital images are easily distributed, copied and modified. This aspect is now so important that image content protection has become a major security issue. In recent …
- 238000000034 method 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sahu et al. | Dual image-based reversible fragile watermarking scheme for tamper detection and localization | |
Barni et al. | A general framework for robust watermarking security | |
Lo et al. | A novel reversible image authentication scheme for digital images | |
Tarhouni et al. | Novel and robust image watermarking for copyright protection and integrity control | |
Shahreza | An improved method for steganography on mobile phone. | |
CN113689318B (en) | Deep semi-fragile watermarking method for image authentication and anti-sample defense | |
JP2001257865A (en) | Information embedding method and extraction method using digital watermark | |
CN113392381B (en) | Watermark generation, decoding method, storage medium, and electronic device | |
Singh et al. | An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection | |
CN110889796B (en) | Watermark embedding and watermark extraction method, device and device | |
Hadmi et al. | A robust and secure perceptual hashing system based on a quantization step analysis | |
CN105160619A (en) | Image watermark detection method | |
JP2008503162A (en) | System and method for digital content security | |
Al-Otum et al. | Copyright protection of color images for android-based smartphones using watermarking with quick-response code | |
Hernandez et al. | A fragile watermarking scheme for image authentication in mobile devices | |
Darwish et al. | Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function | |
Zamani et al. | Genetic substitution-based audio steganography for high capacity applications | |
AlShaikh | Robust and recovery watermarking approach based on SVD and OTP encryption | |
Botta et al. | Fragile watermarking using Karhunen–Loève transform: the KLT-F approach | |
Darwish et al. | Improved color image watermarking using logistic maps and quaternion Legendre-Fourier moments | |
Jain et al. | Review on digital watermarking techniques and its retrieval | |
Maiorana et al. | Multi‐bit watermarking of high dynamic range images based on perceptual models | |
Obimbo et al. | Using digital watermarking for copyright protection | |
Dadkhah et al. | Efficient image authentication and tamper localization algorithm using active watermarking | |
Pal et al. | Reversible watermarking scheme using PVD-DE |