Lin et al., 2007 - Google Patents
Binary document images authentication by thinning digital patternsLin et al., 2007
View PDF- Document ID
- 10224908785604036705
- Author
- Lin C
- Chang W
- Lin Y
- Cheng L
- Publication year
- Publication venue
- Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)
External Links
Snippet
As most documents have been digitized and transmitted over the Internet, it becomes very crucial to protect the integrity of them. Integrity is the process of ensuring that a document is changed by unauthorized users. In this paper, inspired by the Yang and Kot's method, we …
- 238000000034 method 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chang et al. | A watermarking-based image ownership and tampering authentication scheme | |
| Li | Digital fragile watermarking scheme for authentication of JPEG images | |
| KR100465950B1 (en) | Information processing apparatus and its control method, storage medium storing computer program | |
| Rawat et al. | A chaotic system based fragile watermarking scheme for image tamper detection | |
| Chen et al. | A publicly verifiable copyright-proving scheme resistant to malicious attacks | |
| Moon et al. | Data security using data hiding | |
| KR20070042511A (en) | Digital Content Security System and Method | |
| Surekha et al. | A multiple watermarking technique for images based on visual cryptography | |
| CN114782238B (en) | An image self-authentication method based on hash function and information hiding | |
| Danti | Randomized embedding scheme based on dct coefficients for image steganography | |
| Talasila et al. | The hybrid model of lsb—technique in image steganography using aes and rsa algorithms | |
| Bhoskar et al. | A Survey on secrete communication through QR code steganography for military application | |
| Surekha et al. | A watermarking technique based on visual cryptography | |
| Murty et al. | Digital signature and watermark methods for image authentication using cryptography analysis | |
| Hoshi et al. | Digital watermarking: Innovations and challenges in copyright protection | |
| Lin et al. | Binary document images authentication by thinning digital patterns | |
| Raj et al. | A survey on reversible data hiding in encrypted image | |
| Mahule et al. | Analysis of image security techniques using digital image watermarking in spatial domain | |
| Nyeem et al. | Modelling attacks on self-authentication watermarking | |
| Gupta et al. | A survey on reversible watermarking techniques for image security | |
| Sachs et al. | Analysis of signaling pathways in human T-cells using Bayesian network modeling of single cell data | |
| Sherekar et al. | Critical Review of Perceptual Models for Data Authentication | |
| Chang et al. | Public-key inter-block dependence fragile watermarking for image authentication using continued fraction | |
| Shinde et al. | A Review Paper on Image Authentication Scheme | |
| Hou et al. | An Image Authentication Scheme Based on Chaotic Maps |