Cellular Automata Based Authentication (CAA)
ACRI '01 Proceedings of the 5th International Conference on Cellular Automata for Research and Industry
Fragile image watermarking using a gradient image for improved localization and security
Pattern Recognition Letters
Image authentication based on digital signature and semi-fragile watermarking
Journal of Computer Science and Technology
A Robust and Secure Media Signature Scheme for JPEG Images
Journal of VLSI Signal Processing Systems
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
An efficient image authentication method based on Hamming code
Pattern Recognition
A majority-voting based watermarking scheme for color image tamper detection and recovery
Computer Standards & Interfaces
Public Authentication of 3D Mesh Models
WI '06 Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence
Image authentication and recovery scheme based on watermarking technique
CEA'08 Proceedings of the 2nd WSEAS International Conference on Computer Engineering and Applications
Methods for image authentication: a survey
Multimedia Tools and Applications
A key-recovery attack on authentication watermarking by li and yuan
Proceedings of the 10th ACM workshop on Multimedia and security
A light weight buyer-seller watermarking protocol
Advances in Multimedia
A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Expert Systems with Applications: An International Journal
Block-Chain Based Fragile Watermarking Scheme with Superior Localization
Information Hiding
PCM '08 Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
A Color Image Authentication Method Using Partitioned Palette and Morphological Operations
IEICE - Transactions on Information and Systems
A sharing-based fragile watermarking method for authentication and self-recovery of image tampering
EURASIP Journal on Advances in Signal Processing
Recover the tampered image based on VQ indexing
Signal Processing
Fragile Watermarking Scheme with Extensive Content Restoration Capability
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Watermarking algorithm with post-compression capability for digital video surveillance
SIP '07 Proceedings of the Ninth IASTED International Conference on Signal and Image Processing
Image Authentication Scheme Based on Self-embedding Watermarking
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
A secure and robust hash-based scheme for image authentication
Signal Processing
A novel CRT-based watermarking technique for authentication of multimedia contents
Digital Signal Processing
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
From weak to strong watermarking
TCC'07 Proceedings of the 4th conference on Theory of cryptography
A DWT-based fragile watermarking tolerant of JPEG compression
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
Value combination technique for image authentication
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
A novel public key self-embedding fragile watermarking technique for image authentication
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Lossless data embedding in electronic inks
IEEE Transactions on Information Forensics and Security
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
Digital Signal Processing
Image self-embedding with high-quality restoration capability
Digital Signal Processing
International Journal of Electronic Security and Digital Forensics
Time-frequency and time-scale-based fragile watermarking methods for image authentication
EURASIP Journal on Advances in Signal Processing - Special issue on time-frequency analysis and its applications to multimedia signals
Multimedia Tools and Applications
An adaptive image authentication scheme for vector quantization compressed image
Journal of Visual Communication and Image Representation
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Self-embedding watermark with flexible restoration quality
Multimedia Tools and Applications
A blind reversible method for watermarking relational databases based on a time-stamping protocol
Expert Systems with Applications: An International Journal
Transactions on data hiding and multimedia security VI
A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure
Computers and Electrical Engineering
A secure and robust wavelet-based hashing scheme for image authentication
MMM'07 Proceedings of the 13th International conference on Multimedia Modeling - Volume Part II
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Digital image authentication based on error-correction codes
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Restoration in secure text document image authentication using erasable watermarks
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A novel watermarking method with image signature
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
Invertible watermarking scheme for authentication and integrity
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Alteration-locating authentication watermarking for binary images
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
A fragile watermarking technique for image authentication using singular value decomposition
PCM'04 Proceedings of the 5th Pacific Rim Conference on Advances in Multimedia Information Processing - Volume Part II
Secure tamper localization in binary document image authentication
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part IV
Computer Standards & Interfaces
Reversible semi-fragile image authentication using zernike moments and integer wavelet transform
DRMTICS'05 Proceedings of the First international conference on Digital Rights Management: technologies, Issues, Challenges and Systems
Fragile watermarking tamper detection with images compressed by fuzzy transform
Information Sciences: an International Journal
A semi-fragile watermarking scheme based on SVD and VQ techniques
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Analysis and comparison of typical reversible watermarking methods
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Towards lower bounds on embedding distortion in information hiding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
A wavelet-based fragile watermarking scheme for secure image authentication
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
Self-recovery fragile watermarking scheme with variable watermark payload
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A region specific robust watermarking scheme based on singular value decomposition
Proceedings of the Fifth International Conference on Security of Information and Networks
Digital Image Protection using Keyed Hash Function
International Journal of Computer Vision and Image Processing
Self-embedding fragile watermarking scheme combined average with VQ encoding
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
A novel reversible image authentication scheme for digital images
Signal Processing
Hi-index | 0.02 |
We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark, indicating the image is authentic and has not been changed since the insertion of the watermark. Any modification would be reflected in a corresponding error in the watermark. If the key is incorrect, or if the image was not watermarked, or if the watermarked image is cropped, the watermark extraction algorithm will return an image that resembles random noise. Since it requires a user key during both the insertion and the extraction procedures, it is not possible for an unauthorized user to insert a new watermark or alter the existing watermark so that the resulting image will pass the test. We present secret key and public key versions of the technique