scispace - formally typeset
Open Access

Web based image authentication using invisible Fragile watermark

TLDR
A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Abstract
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.

read more

Citations
More filters
Journal ArticleDOI

Application of Fractional Wave Packet Transform for Robust Watermarking of Mammograms.

TL;DR: A robust nonblind medical image watermarking scheme is proposed that is tested on mammograms images and is subjected to common attacks like Gaussian filtering, median filtering, compression, sharpening, and contrast adjustments and shows that the proposed scheme is robust.

Statistical Analysis towards Image Recognition

TL;DR: A new Handwritten Signature Authentication Scheme based on extensive statistical analysis, Mean Variance and Theory of Estimation that supports the application environment and strongly believes that “User Authentication” could be a solid platform for future research and study.
Book ChapterDOI

Symmetric Cryptography Protocol for Signing and Authenticating Digital Documents

TL;DR: This article introduces a security protocol using symmetric cryptography scheme in order to sign and authenticate digital documents and finds out that it provides the fourth level of authentication according to Lowe’s hierarchy.

Design and Implementation of Public Key Steganography

TL;DR: A public key method of Steganography is proposed under standard cryptographic assumptions and the byte location in LSB of which the secret bit is to be embedded is found out by public key of the receiver and receiver apply private key of itself to reconstruct the secret message following RSA assumptions.

Image Authentication and Restoration using Block- Wise Fragile Watermarking based on k-Medoids Clustering Approach

TL;DR: A block-wise fragile watermarking scheme based on k-medoids clustering approach is effective enough to reconstruct the tampered extensive content of an image.
References
More filters
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Exploring steganography: Seeing the unseen

Johnson, +1 more
- 01 Jan 1998 - 
Journal ArticleDOI

Exploring steganography: Seeing the unseen

TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Proceedings ArticleDOI

A robust content based digital signature for image authentication

TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.
Related Papers (5)