Fridrich et al., 2000 - Google Patents
Further attacks on Yeung-Mintzer fragile watermarking schemeFridrich et al., 2000
View PDF- Document ID
- 11098778379600892360
- Author
- Fridrich J
- Goljan M
- Memon N
- Publication year
- Publication venue
- Security and Watermarking of Multimedia Contents II
External Links
Snippet
In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we …
- 238000000034 method 0 abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fridrich et al. | Further attacks on Yeung-Mintzer fragile watermarking scheme | |
Fridrich et al. | New fragile authentication watermark for images | |
US6266429B1 (en) | Method for confirming the integrity of an image transmitted with a loss | |
Wolfgang et al. | A watermarking technique for digital imagery: further studies | |
Liu et al. | An image fragile watermark scheme based on chaotic image pattern and pixel-pairs | |
Fridrich et al. | Invertible authentication | |
Fridrich | Methods for tamper detection in digital images | |
Goljan et al. | Distortion-free data embedding for images | |
Fridrich | Security of fragile authentication watermarks with localization | |
Mukherjee et al. | Spatial domain digital watermarking of multimedia objects for buyer authentication | |
Fridrich et al. | Cryptanalysis of the Yeung–Mintzer fragile watermarking technique | |
Qiao et al. | Watermarking methods for MPEG encoded video: Towards resolving rightful ownership | |
NR et al. | Fragile watermarking scheme for tamper localization in images using logistic map and singular value decomposition | |
Munir | A secure fragile video watermarking algorithm for content authentication based on arnold CAT map | |
Aminuddin et al. | AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem | |
Liu et al. | Lossless image hierarchical recovery based on POB number system | |
Surekha et al. | A multiple watermarking technique for images based on visual cryptography | |
CN106600516B (en) | Image embedding method based on digital fingerprint | |
WO2005015493A1 (en) | Method and apparatus for fragile watermarking | |
Venkatesan et al. | A new data hiding scheme with quality control for binary images using block parity | |
Das et al. | Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme | |
Wu et al. | A secure image authentication algorithm with pixel-level tamper localization | |
Zhong et al. | A new fragile watermarking technique for image authentication | |
Armeni et al. | A transparent watermarking method for color images | |
Hsu et al. | A visual cryptography and statistics based method for ownership identification of digital images |