[go: up one dir, main page]

Kim et al., 2004 - Google Patents

A content-based fragile watermarking scheme for image authentication

Kim et al., 2004

Document ID
14714649774410370385
Author
Kim M
Lee W
Publication year
Publication venue
Advanced Workshop on Content Computing

External Links

Snippet

In this paper, we present an effective image authentication scheme that can tolerate incidental distortions but that indicates tampered regions in cases of malicious manipulation. After having divided an image into blocks in the spatial domain and having obtained the …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/005Robust watermarking, e.g. average attack or collusion attack resistant
    • G06T1/0071Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0052Embedding of the watermark in the frequency domain
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Rey et al. A survey of watermarking algorithms for image authentication
Zhu et al. When seeing isn't believing [multimedia authentication technologies]
Zhang et al. Statistical fragile watermarking capable of locating individual tampered pixels
Fridrich Methods for tamper detection in digital images
Chang et al. A watermarking-based image ownership and tampering authentication scheme
Li Digital fragile watermarking scheme for authentication of JPEG images
US6834344B1 (en) Semi-fragile watermarks
US20120278627A1 (en) Security based on subliminal and supraliminal channels for data objects
Perwej et al. An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection
Dhole et al. Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks
Rey et al. Blind detection of malicious alterations on still images using robust watermarks
WO1998011492A1 (en) Authentication of signals using watermarks
Ho et al. Image content authentication using pinned sine transform
WO2005091547A2 (en) Watermark payload encryption methods and systems
Matheson et al. Robustness and security of digital watermarks
Kim et al. A content-based fragile watermarking scheme for image authentication
Das et al. Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme
Parameswaran et al. Content-based watermarking for image authentication using independent component analysis
Shaw Digital document integrity
He et al. Cryptanalysis on majority-voting based self-recovery watermarking scheme
Dadkhah et al. Efficient image authentication and tamper localization algorithm using active watermarking
Sowers et al. Testing digital watermark resistance to destruction
Kim et al. A robust image authentication method surviving acceptable modifications
Jiang et al. Semi-fragile watermarking algorithm for image tampers localization and recovery
Tuncer et al. A watermarking application for authentication of Holy Quran