scispace - formally typeset
Open Access

Web based image authentication using invisible Fragile watermark

TLDR
A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Abstract
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.

read more

Citations
More filters
Proceedings ArticleDOI

Handwritten signature hiding and extraction using alternate bit stuffing

TL;DR: This work focuses on the protection of digital signature by implementing bit masking to retrieve alternate bits of the watermark image and stuff that bit to the alternate bit positions in the image file at the source end.
Proceedings ArticleDOI

Self recoverable block-wise fragile watermarking scheme based on histogram segmentation

TL;DR: A block-wise fragile watermarking scheme based on histogram segmentation which is capable to rebuild tampered content of an image and extracted Recovery bits from mapping pixel gives adequate information to recover principal content of host image.
Proceedings ArticleDOI

A Method for Signature Authentication Scheme

TL;DR: A new Handwritten Signature Authentication Scheme is proposed, based on extensive statistical analysis, Mean Variance and Theory of Estimation, which combines two main Rule Set Algorithms and one Authentication Algorithm.
Proceedings ArticleDOI

Network Based Public Key Method for Steganography

TL;DR: A Network Based Public Key Method for Steganography is proposed under RSA cryptographic assumptions and has its roots in military and government applications and has advanced in ingenuity and complexity.
Journal Article

An Innovative Idea for Public Key Method of Steganography

TL;DR: This paper proposes an approach to implement public key algorithm based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the position of the secret bit in cover image.
References
More filters
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Exploring steganography: Seeing the unseen

Johnson, +1 more
- 01 Jan 1998 - 
Journal ArticleDOI

Exploring steganography: Seeing the unseen

TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Proceedings ArticleDOI

A robust content based digital signature for image authentication

TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.
Related Papers (5)