scispace - formally typeset
Open Access

Web based image authentication using invisible Fragile watermark

TLDR
A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Abstract
The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.

read more

Citations
More filters

A Secure Framework to Authenticate Remotely Digital Documents based on The TLS Protocol

TL;DR: A secure framework to sign and authenticate remotely digital documents focused on uncontrolled environment is presented, compound by various security protocols used to ensure authentication and confidentiality in each of the services.
Proceedings ArticleDOI

Bi-color nonlinear data embedding and extraction of handwritten signature

TL;DR: Handwritten Signature Image can be transmitted from source to target securely over network after processing the source image by using this proposed Data Hiding Algorithm.

Fragile Pixel-Wise Watermarking using Neighborhood Location Based Technique

Raji Chacko
TL;DR: A efficient novel approach as fragile pixel-wise watermarking using neighborhood location technique based on two bits (Binding & position) bits is proposed as a watermark into the first two LSBs of each pixel of the host image.
Proceedings Article

On the Design of Secure Multimedia Authentication

TL;DR: A novel authentication design method based on multi-feature watermarks is proposed according to the design principle and the experimental results prove the validity of the design method and the significance of the guide principle.
Journal ArticleDOI

Two Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization

TL;DR: A proposed chaos-based encryption algorithm is combined with two fragile watermarking schemes for digital image authentication with tamper detection and localization in order to improve the security, tamper Detection sensitivity and tamper localization accuracy of the two schemes.
References
More filters
Journal ArticleDOI

Techniques for data hiding

TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Proceedings ArticleDOI

A digital watermark

TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Journal ArticleDOI

Exploring steganography: Seeing the unseen

Johnson, +1 more
- 01 Jan 1998 - 
Journal ArticleDOI

Exploring steganography: Seeing the unseen

TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Proceedings ArticleDOI

A robust content based digital signature for image authentication

TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.
Related Papers (5)