Fragile watermarking scheme based on the block-wise dependence in the wavelet domain
Proceedings of the 2004 workshop on Multimedia and security
Image content authentication using pinned sine transform
EURASIP Journal on Applied Signal Processing
Adaptive color image watermarking based on a modified improved pixel-wise masking technique
Computers and Electrical Engineering
A public fragile watermarking scheme for 3D model authentication
Computer-Aided Design
Affine-transformation-invariant public fragile watermarking for 3D model authentication
IEEE Computer Graphics and Applications - Special issue title on demystifying visual analytics impaired driving in virtual spaces
A novel watermarking scheme for image authentication in DWT domain
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
IEEE Transactions on Communications
A novel image watermarking in redistributed invariant wavelet domain
Journal of Systems and Software
Hi-index | 0.01 |
A new approach to digital signatures for imaging, which adapts well to multimedia communications in lossy channels is introduced. Rather than attaching the signature's bit-string as a file-header, it is invisibly etched into the image using a new watermarking algorithm. The watermark is "nonfragile," tolerating small distortions but not malicious tampering aimed at modifying the image's content. In particular, the rank-order relationship in local areas throughout the lowest level of the DWT is exploited to encode the watermark. An edge-based message digest is used. The signature is in the form of binary data and the wavelet decomposition coefficients are modified according to this binary sequence. The signature is also embedded and tested within the SPIHT compression algorithm. The information capacity is studied and the experimental results confirm a logarithm relation between the bit rate and the quantization level, which is similar to the Shannon's capacity theorem. Experiments are performed to examine the signature's transparency and robustness