Secure hybrid robust watermarking resistant against tampering and copy attack
Signal Processing - Special section: Security of data hiding technologies
Fragile image watermarking using a gradient image for improved localization and security
Pattern Recognition Letters
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Expert Systems with Applications: An International Journal
Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
An efficient watermarking technique for the protection of fingerprint images
EURASIP Journal on Information Security
A minutia-based partial fingerprint recognition system
Pattern Recognition
Multimedia Tools and Applications
Fragile Watermarking Based on Encoding of the Zeroes of the -Transform
IEEE Transactions on Information Forensics and Security
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
Hi-index | 0.00 |
For traditional fragile watermarking schemes, isolated-block tamper which will destroy the minutiae of the fingerprint image can hardly be efficiently detected. In this paper, we propose a multi-block dependency based fragile watermarking scheme to overcome this shortcoming. The images are split into image blocks with size of 8 脳 8; a 64-bit watermark is generated for each image block, and then equally partitioned into eight parts. Each part of the watermark is embedded into another image block which is selected by the corresponding secret key. Theoretic analysis and experimental results demonstrate that the proposed method not only can detect and localize the isolated-block tamper on fingerprint images with high detection probability and low false detection probability, but also enhances the systematic security obviously.