A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
PCA-based web page watermarking
Pattern Recognition
A novel image watermarking scheme based on amplitude attack
Pattern Recognition
A robust associative watermarking technique based on similarity diagrams
Pattern Recognition
Speaker identification security improvement by means of speech watermarking
Pattern Recognition
Circularly orthogonal moments for geometrically robust image watermarking
Pattern Recognition
Digital watermarking based on chaotic map and reference register
Pattern Recognition
An adjusted-purpose digital watermarking technique
Pattern Recognition
Secure semi-blind watermarking based on iteration mapping and image features
Pattern Recognition
IEEE Transactions on Information Technology in Biomedicine
IEEE Journal on Selected Areas in Communications
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.01 |
We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439-446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and information hiding in images, Pattern Recognition 37 (3) (2004) 475-486]. We show how the Chang et al. scheme still allows pixels to be tampered, and furthermore discuss why its ownership cannot be uniquely binding. Our results indicate that the scheme does not achieve its designed objectives of tamper detection and image ownership.