Open Access
Web based image authentication using invisible Fragile watermark
Yusuk Lim,Changsheng Xu,David Dagan Feng +2 more
- pp 31-34
TLDR
A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.Abstract:
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.read more
Citations
More filters
Journal ArticleDOI
Securing Medical Images by Watermarking Using DWT DCT and SVD
Nilesh Rathi,Ganga Holi +1 more
TL;DR: This paper proposes blind watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform and Singular Value Decomposition and it is shown that the proposed method DWT, DCT and SVD comparatively better than DWT and SVA method.
Journal ArticleDOI
Invisible Digital Watermarking Through Encryption
TL;DR: Digital embedding technique is proposed for hiding an image into another image in such a way that the quality of the recovered image improves significantly and could greatly strengthen the enforcement of copyright law on the Internet.
Proceedings ArticleDOI
An approach of efficient and resistive digital watermarking using SVD
TL;DR: In the proposed technique, the image is first converted into YCbCr from RGB domain then watermark is embedded in Y component of YBCr using Discrete Wavelet Transform and Singular Value Decomposition (SVD).
Book ChapterDOI
New Trends and Challenges in Digital Watermarking Technology. Applications for Printed Materials
TL;DR: In this paper, the authors introduce some new trends and challenges in the research and application of digital watermarking for printed materials, including authentication and authentication of printed materials using mobile cameras.
References
More filters
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Exploring steganography: Seeing the unseen
Neil F. Johnson,Sushil Jajodia +1 more
TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Proceedings ArticleDOI
A robust content based digital signature for image authentication
Marc Schneider,Shih-Fu Chang +1 more
TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.