Embedding robust labels into images for copyright protection
KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies
Pitfalls in Public Key Watermarking
SIBGRAPI '99 Proceedings of the XII Brazilian Symposium on Computer Graphics and Image Processing
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 3 - Volume 3
A Secure Data Hiding Scheme for Two-Color Images
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Data hiding by smart pair toggling for halftone images
ICASSP '00 Proceedings of the Acoustics, Speech, and Signal Processing, 2000. on IEEE International Conference - Volume 04
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Data hiding watermarking for halftone images
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images
IEEE Transactions on Circuits and Systems for Video Technology
A General Data Hiding Framework and Multi-level Signature for Binary Images
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
A new data hiding scheme for binary image authentication with small image distortion
Information Sciences: an International Journal
New public-key authentication watermarking for JBIG2 resistant to parity attacks
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Secure tamper localization in binary document image authentication
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Hi-index | 0.00 |
In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small number of cryptography-based secure authentication methods are available for binary images. This paper proposes a new authentication watermarking method for binary images. It can detect any visually significant alteration while maintaining good visual quality for virtually all types of binary images (possibly excluding dispersed-dot halftones). As usual, the security of the algorithm lies only on the secrecy of a secret- or private-key. This paper also presents a variation of the proposed scheme that can locate the modified region with good spatial resolution. A possible application of the proposed technique is in Internet fax transmission, i.e. for legal authentication of documents routed outside the phone network.