Digital watermarking
Vector Space Projections: A Numerical Approach to Signal and Image Processing, Neural Nets, and Optics
DCT-based watermark recovering without resorting to the uncorrupted original image
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Digital Watermarking on Still Images Using Wavelet Transform
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A Fragile Watermarking Scheme for Image Authentication with Localization and Recovery
ISMSE '04 Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering
The LOCKSS peer-to-peer digital preservation system
ACM Transactions on Computer Systems (TOCS)
Region of Interest Fragile Watermarking for Image Authentication
IMSCCS '06 Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences - Volume 1 (IMSCCS'06) - Volume 01
JPEG2000-based secure image authentication
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
A survey of watermarking algorithms for image authentication
EURASIP Journal on Applied Signal Processing
IEEE Transactions on Information Theory
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
IEEE Transactions on Image Processing
Multiscale Fragile Watermarking Based on the Gaussian Mixture Model
IEEE Transactions on Image Processing
A joint layered scheme for reliable and secure mobile JPEG-2000 streaming
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
One of the main goals of digital content authentication and preservation techniques is to guarantee the originality and quality of the information. In this article, robust watermarking is used to embed content-based fragile signatures in multimedia signals to achieve efficient authentication without requiring any third-party reference or side information. To overcome the signature alteration caused by the embedding perturbation and other possible encoding operations, a closed-form compensation technique is proposed for ensuring signature consistency by employing a Lagrangian-based approach. A minimum distortion criterion is used to ensure signal quality. The effectiveness of the proposed approach is investigated with simulations of examples of image authentication in which signatures are designed to reveal tamper localization. Results using quantitative performance criteria show successful authentication over a range of robustness in embedding watermarks using both QIM-DM and spread-spectrum techniques. A comparison with two iterative compensation schemes is also presented.