Kim et al., 2004 - Google Patents
A content-based fragile watermarking scheme for image authenticationKim et al., 2004
- Document ID
- 14714649774410370385
- Author
- Kim M
- Lee W
- Publication year
- Publication venue
- Advanced Workshop on Content Computing
External Links
Snippet
In this paper, we present an effective image authentication scheme that can tolerate incidental distortions but that indicates tampered regions in cases of malicious manipulation. After having divided an image into blocks in the spatial domain and having obtained the …
- 238000000034 method 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rey et al. | A survey of watermarking algorithms for image authentication | |
Zhu et al. | When seeing isn't believing [multimedia authentication technologies] | |
Zhang et al. | Statistical fragile watermarking capable of locating individual tampered pixels | |
Fridrich | Methods for tamper detection in digital images | |
Chang et al. | A watermarking-based image ownership and tampering authentication scheme | |
Li | Digital fragile watermarking scheme for authentication of JPEG images | |
US6834344B1 (en) | Semi-fragile watermarks | |
US20120278627A1 (en) | Security based on subliminal and supraliminal channels for data objects | |
Perwej et al. | An Adaptive Watermarking Technique for the copyright of digital images and Digital Image Protection | |
Dhole et al. | Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks | |
Rey et al. | Blind detection of malicious alterations on still images using robust watermarks | |
WO1998011492A1 (en) | Authentication of signals using watermarks | |
Ho et al. | Image content authentication using pinned sine transform | |
WO2005091547A2 (en) | Watermark payload encryption methods and systems | |
Matheson et al. | Robustness and security of digital watermarks | |
Kim et al. | A content-based fragile watermarking scheme for image authentication | |
Das et al. | Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme | |
Parameswaran et al. | Content-based watermarking for image authentication using independent component analysis | |
Shaw | Digital document integrity | |
He et al. | Cryptanalysis on majority-voting based self-recovery watermarking scheme | |
Dadkhah et al. | Efficient image authentication and tamper localization algorithm using active watermarking | |
Sowers et al. | Testing digital watermark resistance to destruction | |
Kim et al. | A robust image authentication method surviving acceptable modifications | |
Jiang et al. | Semi-fragile watermarking algorithm for image tampers localization and recovery | |
Tuncer et al. | A watermarking application for authentication of Holy Quran |