A proposal for a new block encryption standard
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Representations that uniquely characterize images modulo translation, rotation, and scaling
Pattern Recognition Letters
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Use of Elliptic Curves in Cryptography
CRYPTO '85 Advances in Cryptology
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Rotation, Translation and Scale Invariant Digital Image Watermarking
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
IEEE Transactions on Information Theory
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Block-Chain Based Fragile Watermarking Scheme with Superior Localization
Information Hiding
An adjusted-purpose digital watermarking technique
Pattern Recognition
SVD and DWT zero-bit watermarking algorithm
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3
Multimedia Tools and Applications
A novel self-recovery fragile watermarking scheme based on dual-redundant-ring structure
Computers and Electrical Engineering
Enhancing the transmission security of content-based hidden biometric data
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
System architecture analysis of a hybrid watermarking method
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Protecting biometric data for personal identification
SINOBIOMETRICS'04 Proceedings of the 5th Chinese conference on Advances in Biometric Person Authentication
Computer Standards & Interfaces
A wavelet-based fragile watermarking scheme for secure image authentication
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Multi-block dependency based fragile watermarking scheme for fingerprint images protection
Multimedia Tools and Applications
Hi-index | 0.00 |
Digital watermarking appears today as an efficient mean of securing multimedia documents. Several application scenarios in the security of digital watermarking have been pointed out, each of them with different requirements. The three main identified scenarios are: copyright protection, i.e. protecting ownership and usage rights; tamper proofing, aiming at detecting malicious modifications; and authentication, the purpose of which is to check the authenticity of the originator of a document. While robust watermarks, which survive to any change or alteration of the protected documents, are typically used for copyright protection, tamper proofing and authentication generally require fragile or semi-fragile watermarks in order to detect modified or faked documents. Further, most of robust watermarking schemes are vulnerable to the so-called copy attack, where a watermark can be copied from one document to another by any unauthorized person, making these schemes inefficient in all authentication applications. In this paper, we propose a hybrid watermarking method joining a robust and a fragile or semi-fragile watermark, and thus combining copyright protection and tamper proofing. As a result this approach is at the same time resistant against copy attack. In addition, the fragile information is inserted in a way which preserves robustness and reliability of the robust part. The numerous tests and the results obtained according to the Stirmark benchmark demonstrate the superior performance of the proposed approach.