Perceptual Digital Watermarking for Image Authentication in Electronic Commerce
Electronic Commerce Research
Blind watermarking applied to image authentication
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
A remote sensing image self-adaptive blind watermarking algorithm based on wavelet transformation
SSIP'07 Proceedings of the 7th WSEAS International Conference on Signal, Speech and Image Processing
Adaptive block watermarking and its SOC implementation based on JPEG2000 DWT
SSIP'07 Proceedings of the 7th WSEAS International Conference on Signal, Speech and Image Processing
A watermarking system based on complementary quantization
SSIP'06 Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing
Computer algorithms for direct encryption and decryption of digital images for secure communication
ACS'06 Proceedings of the 6th WSEAS international conference on Applied computer science
Parallel implementation of spread spectrum based oblivious visual watermarking using efficient DWT
ACS'06 Proceedings of the 6th WSEAS international conference on Applied computer science
Hi-index | 0.00 |
Digital watermarking was commenced to copyright protection and ownership verification of multimedia data. However the evolution of the watermark focused on different security aspects of multimedia data such as integrity and authenticity. Fragile and semi-fragile watermarking schemes were introduced to accomplish these requirements. In this paper, we propose semi-fragile watermarking scheme to authenticate visual content of the image. The proposed method is carried out in DCT domain and authenticating the particular number of low frequency coefficient, it achieves the integrity of the image. Since low frequency coefficients carry the essence of the visual data, authenticating only the low frequency data is adequate. Therefore the proposed technique is efficient than the others, which are processing in all DCT coefficients. Digital signature is generated by following the definition of elliptic curve digital signature algorithm (ECDSA). Thus, the scheme is faster than RSA based authentication definition and it provides high level of security and availability. Additionally our scheme localizes the compromised area of the image. Embedded and visual data are protected from quantization of JPEG by altering the quantization table. However the degradation of compression ratio due to alternation in quantization table has been evaluated. Experimental results show that the watermark does not make any visual artifact in original data and it gives evidence that compression ratio degradation is ignorable for average JPEG quality factors.