Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
An introduction to support Vector Machines: and other kernel-based learning methods
An introduction to support Vector Machines: and other kernel-based learning methods
Pattern Recognition Letters
A public verifiable copy protection technique for still images
Journal of Systems and Software
DEXA '01 Proceedings of the 12th International Workshop on Database and Expert Systems Applications
An Image Copyright Protection Scheme Based on Torus Automorphism
CW '02 Proceedings of the First International Symposium on Cyber Worlds (CW'02)
Structural digital signature for image authentication: an incidental distortion resistant scheme
IEEE Transactions on Multimedia
Image-adaptive watermarking using visual models
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
Secure randomized image watermarking based on singular value decomposition
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
The most significant bit- (MSB-) plane of an image is least likely to change by the most signal processing operations. This paper presents a novelmultibit logo-based signature, using themost significant gray-scale bits, which is then used to develop an extremely simple but robust copyright protection scheme, where images along with their signatures are sent to a trusted third party when a dispute arises. Different ways of processing the MSB-plane before calculating the robust signature have been developed. This paper then presents an innovative classifier-based technique to test the robustness and uniqueness of any signature-based scheme. A new MSB-based attack, which would defeat our scheme most, has also been proposed. Experimental results have clearly demonstrated the superiority of the proposed scheme showing the high robustness of differentMSB-based signatures over the existing signaturebased schemes.