Digital Image Processing
Secure hybrid robust watermarking resistant against tampering and copy attack
Signal Processing - Special section: Security of data hiding technologies
Fragile Watermarking Scheme Exploiting Non-Deterministic Block-Wise Dependency
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
Fragile image watermarking using a gradient image for improved localization and security
Pattern Recognition Letters
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Bayesian tree-structured image modeling using wavelet-domain hidden Markov models
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Block-Chain Based Fragile Watermarking Scheme with Superior Localization
Information Hiding
Fragile Watermarking Scheme with Extensive Content Restoration Capability
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Multimedia Tools and Applications
Computer Standards & Interfaces
Hi-index | 0.00 |
This paper proposes a wavelet-based fragile watermarking scheme for secure image authentication. In the proposed scheme, the embedded watermark is generated using the discrete wavelet transform (DWT), and then the improved security watermark by scrambling encryption is embedded into the least significant bit (LSB) of the host image. The proposed algorithm not only possesses excellent tamper localization properties and greater security against many attacks, but also demonstrates a new useful feature that can indicate whether the modification made to the image is on the contents or the embedded watermark. If only the watermark is modified, the authenticity of the image is assured, instead of being declared as a counterfeit. Experimental results illustrate the effectiveness of our method.