scispace - formally typeset
Open Access

Web based image authentication using invisible Fragile watermark

TLDR
A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Abstract
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.

read more

Citations
More filters
Proceedings ArticleDOI

Analysis of Modified LSB Approaches of Hiding Information in Digital Images

TL;DR: This paper describes on how one can use the human vision system and pure steganography to increase the size of the data that the authors want to embed in the image to enhance the work of LSB.
Book ChapterDOI

Web-Based Intelligent EEG Signal Authentication and Tamper Detection System for Secure Telemonitoring

TL;DR: This chapter proposes a novel approach to design a robust online biomedical content authentication and tamper detection system, where a watermark is embedded on the biomedical information to be sent, to protect its integrity and safety.
Journal ArticleDOI

A Method for Public Key Method of Steganography

TL;DR: A public key method of Steganography is proposed under standard cryptographic assumptions to find the exact Byte location of the carrier file, in LSB of which a particular bit of the secret message is to be embedded.
Book ChapterDOI

Combined encryption and watermarking approaches for scalable multimedia coding

TL;DR: A structure to perform layered access protection by combining encryption and robust watermarking is proposed and implemented and the scalable transmission method over the broadcasting environment is adopted.
Book ChapterDOI

Web Image Authentication Using Embedding Invisible Watermarking

TL;DR: In this paper, the authors presented web service for image authentication using the third party network by embedding an invisible watermark digital signature image into color image, where the client provided the handwritten signature and host image (bicolor image), which will send to server end.
References
More filters
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Exploring steganography: Seeing the unseen

Johnson, +1 more
- 01 Jan 1998 - 
Journal ArticleDOI

Exploring steganography: Seeing the unseen

TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Proceedings ArticleDOI

A robust content based digital signature for image authentication

TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.
Related Papers (5)