Analysis of a Wavelet-based Watermarking Algorithm
CONIELECOMP '04 Proceedings of the 14th International Conference on Electronics, Communications and Computers
Digital Watermarking on Still Images Using Wavelet Transform
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
A Secure Hierarchical Fragile Watermarking Method with Tamper Localization
IMSCCS '06 Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences - Volume 2 (IMSCCS'06) - Volume 02
An Image Watermarking Scheme with Tamper Detection and Recovery
ICICIC '06 Proceedings of the First International Conference on Innovative Computing, Information and Control - Volume 3
A Novel Multipurpose Watermarking Scheme for Copyright Protection and Content Authentication
DMAMH '07 Proceedings of the Second Workshop on Digital Media and its Application in Museum & Heritage
Methods for image authentication: a survey
Multimedia Tools and Applications
Sharing secrets in stego images with authentication
Pattern Recognition
Digital Image Watermarking with Blind Detection for Copyright Verification
CISP '08 Proceedings of the 2008 Congress on Image and Signal Processing, Vol. 1 - Volume 01
A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
Semi-Fragile Watermarking Based on Image Gradient
CIS '08 Proceedings of the 2008 International Conference on Computational Intelligence and Security - Volume 01
IEEE Transactions on Multimedia
Multipurpose image watermarking algorithm based on multistage vector quantization
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and image secret sharing. Different from other schemes that use one piece of watermark information for one purpose and a different piece for another, the watermark information used for original verification is also utilized for tamper detection. Moreover, unlike other schemes that employ a fixed strength value for embedding watermarks, the scheme automatically utilizes two different strength values, one for flat regions and the other for complex regions. The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality. The results also demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.