Error Control Coding, Second Edition
Error Control Coding, Second Edition
Speech in noisy environments (spine) adds new dimension to speech recognition R&D
HLT '02 Proceedings of the second international conference on Human Language Technology Research
Digital Watermarking and Steganography
Digital Watermarking and Steganography
DE-based reversible data hiding with improved overflow location map
IEEE Transactions on Circuits and Systems for Video Technology
Secure reversible visible image watermarking with authentication
Image Communication
Reversible image watermarking using interpolation technique
IEEE Transactions on Information Forensics and Security
Reversible fragile watermarking for 2-D vector map authentication with localization
Computer-Aided Design
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
In general reversible watermarking algorithms, the convention is to reject the entire cover image at the receiver end if it fails authentication, since there is no way to detect the exact locations of tampering. This feature may be exploited by an adversary to bring about a form of DoS attack. Here we provide a solution to this problem in form of a tamper localization mechanism for reversible watermarking algorithms, which allows selective rejection of distorted cover image regions in case of authentication failure, thus avoiding rejection of the complete image. Additionally it minimizes the bandwidth requirement of the communication channel.