Open Access
Web based image authentication using invisible Fragile watermark
Yusuk Lim,Changsheng Xu,David Dagan Feng +2 more
- pp 31-34
TLDR
A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.Abstract:
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.read more
Citations
More filters
A Secure Framework to Authenticate Remotely Digital Documents based on The TLS Protocol
Juan Carlos López Pimentel,Rodolfo E. Ibarra Orozco,Víctor Fernando Ramos Fon Bon,Raúl Monroy +3 more
TL;DR: A secure framework to sign and authenticate remotely digital documents focused on uncontrolled environment is presented, compound by various security protocols used to ensure authentication and confidentiality in each of the services.
Proceedings ArticleDOI
Bi-color nonlinear data embedding and extraction of handwritten signature
TL;DR: Handwritten Signature Image can be transmitted from source to target securely over network after processing the source image by using this proposed Data Hiding Algorithm.
Fragile Pixel-Wise Watermarking using Neighborhood Location Based Technique
TL;DR: A efficient novel approach as fragile pixel-wise watermarking using neighborhood location technique based on two bits (Binding & position) bits is proposed as a watermark into the first two LSBs of each pixel of the host image.
Proceedings Article
On the Design of Secure Multimedia Authentication
TL;DR: A novel authentication design method based on multi-feature watermarks is proposed according to the design principle and the experimental results prove the validity of the design method and the significance of the guide principle.
Journal ArticleDOI
Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
TL;DR: A proposed chaos-based encryption algorithm is combined with two fragile watermarking schemes for digital image authentication with tamper detection and localization in order to improve the security, tamper Detection sensitivity and tamper localization accuracy of the two schemes.
References
More filters
Journal ArticleDOI
Techniques for data hiding
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI
A digital watermark
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI
Exploring steganography: Seeing the unseen
Neil F. Johnson,Sushil Jajodia +1 more
TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Proceedings ArticleDOI
A robust content based digital signature for image authentication
Marc Schneider,Shih-Fu Chang +1 more
TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.