The Hartley transform
Transform techniques for error control codes
IBM Journal of Research and Development
Fast algorithms for matrix multiplication usingpseudo-number-theoretic transforms
IEEE Transactions on Signal Processing
Blind quality assessment system for multimedia communications using tracing watermarking
IEEE Transactions on Signal Processing
Number theoretic transforms over the golden section quadratic field
IEEE Transactions on Signal Processing
A fragile watermark error detection scheme for wireless video communications
IEEE Transactions on Multimedia
The use of finite fields to compute convolutions
IEEE Transactions on Information Theory
Hartley transforms over finite fields
IEEE Transactions on Information Theory
Multipurpose watermarking for image authentication and protection
IEEE Transactions on Image Processing
The fractional Fourier transform over finite fields
Signal Processing
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Intelligent reversible watermarking and authentication: Hiding depth map information for 3D cameras
Information Sciences: an International Journal
Hi-index | 0.00 |
Fragile digital watermarking has been applied for authentication and alteration detection in images. Utilizing the cosine and Hartley transforms over finite fields, a new transform domain fragile watermarking scheme is introduced. A watermark is embedded into a host image via a blockwise application of two-dimensional finite field cosine or Hartley transforms. Additionally, the considered finite field transforms are adjusted to be number theoretic transforms, appropriate for error-free calculation. The employed technique can provide invisible fragile watermarking for authentication systems with tamper location capability. It is shown that the choice of the finite field characteristic is pivotal to obtain perceptually invisible watermarked images. It is also shown that the generated watermarked images can be used as publicly available signature data for authentication purposes.