Open Access
Web based image authentication using invisible Fragile watermark
Yusuk Lim,Changsheng Xu,David Dagan Feng +2 more
- pp 31-34
TLDR
A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.Abstract:
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.read more
Citations
More filters
Proceedings ArticleDOI
Handwritten signature hiding and extraction using alternate bit stuffing
TL;DR: This work focuses on the protection of digital signature by implementing bit masking to retrieve alternate bits of the watermark image and stuff that bit to the alternate bit positions in the image file at the source end.
Proceedings ArticleDOI
Self recoverable block-wise fragile watermarking scheme based on histogram segmentation
TL;DR: A block-wise fragile watermarking scheme based on histogram segmentation which is capable to rebuild tampered content of an image and extracted Recovery bits from mapping pixel gives adequate information to recover principal content of host image.
Proceedings ArticleDOI
A Method for Signature Authentication Scheme
TL;DR: A new Handwritten Signature Authentication Scheme is proposed, based on extensive statistical analysis, Mean Variance and Theory of Estimation, which combines two main Rule Set Algorithms and one Authentication Algorithm.
Proceedings ArticleDOI
Network Based Public Key Method for Steganography
TL;DR: A Network Based Public Key Method for Steganography is proposed under RSA cryptographic assumptions and has its roots in military and government applications and has advanced in ingenuity and complexity.
Journal Article
An Innovative Idea for Public Key Method of Steganography
TL;DR: This paper proposes an approach to implement public key algorithm based on RSA assumptions with traditional LSB modification scheme for Steganography to randomize the position of the secret bit in cover image.
References
More filters
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Exploring steganography: Seeing the unseen
Neil F. Johnson,Sushil Jajodia +1 more
TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Proceedings ArticleDOI
A robust content based digital signature for image authentication
Marc Schneider,Shih-Fu Chang +1 more
TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.