A fragile color image watermarking framework focusing a new invisible domain
Abstract
References
Index Terms
- A fragile color image watermarking framework focusing a new invisible domain
Recommendations
A Dynamic Watermarking Scheme for Color Image Authentication
ARTCOM '09: Proceedings of the 2009 International Conference on Advances in Recent Technologies in Communication and ComputingImage authentication has achieved a sharp attention now a day due to broad availability of internet services. Maldistribution and illegal copying of image, volatiles the authenticity of image-ownership. In this regard we’ve already proposed different ...
A chip-based watermarking framework for color image authentication
ICCCS '11: Proceedings of the 2011 International Conference on Communication, Computing & SecurityIn today's scenario authentication of multimedia contents have received a sharp attention as a result of epidemic development of cyber crime. Illegal replication, misappropriation of digital content has achieved an enigmatic growth. In this regard we've ...
A blind double color image watermarking algorithm based on QR decomposition
In this paper, a novel blind image watermarking scheme based on QR decomposition is proposed to embed color watermark image into color host image, which is significantly different from using the binary or gray image as watermark. When embedding ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Sanjay Kumar Jena,
- Rajeev Kumar,
- Program Chairs:
- Ashok Kumar Turuk,
- Manoranjan Dash
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 152Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in