Proceedings ArticleDOI
Digital signature of color images using amplitude modulation
Reads0
Chats0
TLDR
A new method based on amplitude modulation is presented that has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks and can be extracted without the original image.Abstract:
Watermarking techniques, also referred to as digital signature, sign images by introducing changes that are imperceptible to the human eye but easily recoverable by a computer program. Generally, the signature is a number which identifies the owner of the image. The locations in the image where the signature is embedded are determined by a secret key. Doing so prevents possible pirates from easily removing the signature. Furthermore, it should be possible to retrieve the signature from an altered image. Possible alternations of signed images include blurring, compression and geometrical transformations such as rotation and translation. These alterations are referred to as attacks. A new method based on amplitude modulation is presented. Single signature bits are multiply embedded by modifying pixel values in the blue channel. These modifications are either additive or subtractive, depending on the value of the bit, and proportional to the luminance. This new method has shown to be resistant to both classical attacks, such as filtering, and geometrical attacks. Moreover, the signature can be extracted without the original image.read more
Citations
More filters
Book ChapterDOI
Iris Segmentation Methodologies
TL;DR: Traditional iris processing following Daugman’s approach extracts binary features after mapping the textural area between inner pupillary and outer limbic boundary into a doubly dimensionless representation.
Journal ArticleDOI
Color image watermarking based on self-embedded color permissibility with preserved high image quality and enhanced robustness
TL;DR: Experimental results have shown that the CIW-SECP technique exhibits very high imperceptibility (PSNR∈[71.21–85.95] dB) as well as superior performance against most prominent attacks.
Proceedings ArticleDOI
Watermarking scheme for large images using parallel processing
TL;DR: This paper proposes to tile the image into sub-images, then the watermarking scheme is then applied to each sub-image in the embedding and retrieval process, and shows that the time spent in input/output operations, which can be a bottleneck for large images, is reduced.
Patent
Readers to analyze security features on objects
Robert L. Jones,Alastair M. Reed +1 more
TL;DR: In this article, the authors present a reader that analyzes emerging security or authentication features for physical objects (e.g., identification documents, product packaging, banknotes, etc.).
Proceedings ArticleDOI
Multi-level watermarking with independent decoding
Moshe Butman,Hagit Hel-Or +1 more
TL;DR: This work presents a watermarking technique which requires no information for decoding in addition to the watermarked image, which allows detection of "tampered" and "attacked" images by detection of existence of the watermark at low levels and deterioration of theWatermark at high levels.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Proceedings ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data hiding process and evaluates these techniques in light of three applications: copyright protecting, tamper-proofing, and augmentation data embedding.