SARI: self-authentication-and-recovery image watermarking system
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
Image retrieval based on perceptive weighted color blocks
Pattern Recognition Letters
Watermarking in secure image retrieval
Pattern Recognition Letters
Adaptive color quantization based on perceptive edge protection
Pattern Recognition Letters
Protection of Mammograms Using Blind Steganography and Watermarking
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
One-way hash function construction based on 2D coupled map lattices
Information Sciences: an International Journal
Multiple layer data hiding scheme for medical images
Computer Standards & Interfaces
Invariant Image Watermarking Based on Local Feature Regions
CW '08 Proceedings of the 2008 International Conference on Cyberworlds
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Look-up table (LUT) method for inverse halftoning
IEEE Transactions on Image Processing
Fragile watermarking for color image recovery based on color filter array interpolation
WAIM'10 Proceedings of the 11th international conference on Web-age information management
Image self-embedding with high-quality restoration capability
Digital Signal Processing
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Watermark based recovery of tampered documents
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics
Hi-index | 0.08 |
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabilities that put digital documents at risk. The problem is in the security mechanism adopted to secure these documents by means of encrypted passwords; however, this security shield does not actually protect the documents which are stored intact. We propose here a solution to this real world problem through a 1D hash algorithm coupled with 2D iFFT (irreversible Fast Fourier Transform) to encrypt digital documents in the 2D spatial domain. Further by applying an imperceptible information hiding technique we can add another security layer which is resistant to noise and to a certain extent JPEG compression. We support this assertion by showing a practical example which is drawn from our set of experiments. This work exploits Jarvis' kernel to generate the error diffusion signal and the Wavelet-based Inverse Halftoning via De-convolution (WInHD) to recover the approximation of the original signal. Our method not only points out forgery but also allows legal or forensics expert gain access to the original document despite being manipulated. This would undoubtedly be very useful in cases of disputes or claims.