Wu et al., 2004 - Google Patents
A secure image authentication algorithm with pixel-level tamper localizationWu et al., 2004
View PDF- Document ID
- 16002381810187798864
- Author
- Wu J
- Zhu B
- Li S
- Lin F
- Publication year
- Publication venue
- 2004 International Conference on Image Processing, 2004. ICIP'04.
External Links
Snippet
In this paper, we use a generalized model for all the previously proposed pixel-wise authentication schemes. Then we show how this model can be compromised with an Oracle attack. This motivated us to develop a novel authentication scheme to be described here …
- 230000004807 localization 0 title abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li | Digital fragile watermarking scheme for authentication of JPEG images | |
Zhu et al. | When seeing isn't believing [multimedia authentication technologies] | |
Fridrich | Methods for tamper detection in digital images | |
Chang et al. | A watermarking-based image ownership and tampering authentication scheme | |
Zhang et al. | Fragile watermarking scheme with extensive content restoration capability | |
US7454797B2 (en) | Secure image authentication with discrete level tamper localization | |
He et al. | A wavelet-based fragile watermarking scheme for secure image authentication | |
Gayathri et al. | Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme | |
Wu et al. | A secure image authentication algorithm with pixel-level tamper localization | |
Tu et al. | A BTC-based watermarking scheme for digital images | |
Mathkour et al. | A novel approach for hiding messages in images | |
He et al. | Block-chain based fragile watermarking scheme with superior localization | |
Zhong et al. | A new fragile watermarking technique for image authentication | |
Hisham et al. | A quick glance at digital watermarking in medical images | |
Wu et al. | Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes | |
Lee et al. | A Hierarchical Fragile Watermarking with VQ Index Recovery. | |
He et al. | Cryptanalysis on majority-voting based self-recovery watermarking scheme | |
Lei et al. | An image watermarking based on multi-level authentication for quick response code | |
Saha et al. | Security on fragile and semi-fragile watermarks authentication | |
Dadkhah et al. | Efficient image authentication and tamper localization algorithm using active watermarking | |
Basu et al. | Bit plane index based fragile watermarking scheme for authenticating color image | |
Ma et al. | A new audio watermarking method for copyright protection and tampering localization | |
Puhan et al. | Secure tamper localization in binary document image authentication | |
Kesidis et al. | A robust image watermarking technique based on spectrum analysis and pseudorandom sequences | |
Hassan et al. | Variable block-size image authentication with localization and self-recovery |