LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Li, Chang-Tsun; Yuan, Yinyin (2006)
Publisher: S P I E - International Society for Optical Engineering
Languages: English
Types: Article
Subjects: TA

Classified by OpenAIRE into

ACM Ref: Data_MISCELLANEOUS
Identifiers:doi:10.1117/1.2402932
Watermarking schemes for authentication purposes are characterized by three factors: security, resolution of tamper localization, and embedding distortion. Since the requirements of high security, high localization resolution, and low distortion cannot be fulfilled simultaneously, the relative importance of a particular factor is application-dependent. Moreover, blockwise dependence is recognized as a key requirement for fragile watermarking schemes to thwart the Holliman-Memon counterfeiting attack. However, it has also been observed that deterministic dependence is still susceptible to transplantation attack or even simple cover-up attack. This work proposes a fragile watermarking scheme for image authentication, which exploits nondeterministic dependence and provides the users with freedom of making trade-offs among the three factors according to the needs of their applications.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen, “Toward secure public-key block-wise fragile authentication watermarking,” in IEE Proceedings - Vision, Image and Signal Processing, 148(2), 57 - 62 (2002).
    • [2] A. G. Bors and I. Pitas, “Image watermarking using block site selection and dct domain constraints,” Optics Express, 3(12), 512-522 (1998).
    • [3] J. Fridrich, M. Goljan, and N. Memon, “Cryptanalysis of the yeung-mintzer fragile watermarking technique,” Journal of Electronic Imaging, 11(2), 262-274 (2002).
    • [4] J. Fridrich, "Security of fragile authentication watermarks with localization," in Proc. SPIE Security and Watermarking of Multimedia Contents, VI, 691-700 (2002).
    • [5] J Fridrich, M. Goljan and A.C. Baldoza, "New fragile authentication watermark for images," in Proc. IEEE International Conference on Image Processing, 694-697 (2000).
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article