2005
DOI: 10.1117/12.614054
|View full text |Cite
|
Sign up to set email alerts
|

<title>Quantization-based semi-fragile public-key watermarking for secure image authentication</title>

Abstract: Authentication watermarking approaches can be classified into two kinds: fragile and semi-fragile. In contrast to the latter one, fragile watermarking does not tolerate modifications of any single bit of the watermarked data. Since the transmission of digital data often requires lossy compression, an authentication system should accept non-malicious modifications such as JPEG compression. Semi-fragile techniques aim to discriminate malicious manipulations from admissible manipulations. In our approach, we extr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…For semi-fragile watermarking algorithms in spatial domains, the pixels of digital images are processed directly to achieve the purpose of embedding watermarking information [10][11][12][13][14]. For example, some algorithms embed the watermarking information into the least significant bit (LSB) in the image pixels directly [11,12].…”
Section: Spatial Domainmentioning
confidence: 99%
See 1 more Smart Citation
“…For semi-fragile watermarking algorithms in spatial domains, the pixels of digital images are processed directly to achieve the purpose of embedding watermarking information [10][11][12][13][14]. For example, some algorithms embed the watermarking information into the least significant bit (LSB) in the image pixels directly [11,12].…”
Section: Spatial Domainmentioning
confidence: 99%
“…Although the spatial domain algorithms can be implemented easily, it is difficult to balance the invisibility and robustness of the watermark. Schlauweg et al [10] proposed an authentication algorithm combining multidimensional dither modulation with error-correction coding. By using lattice quantization, the watermarking information associated with the image content is generated by all the pixel values in the image.…”
Section: Spatial Domainmentioning
confidence: 99%
“…We suggested creating a gap around this threshold to tolerate slight changes due to compression. Further, a mapping process was presented that allows using a quantization-based watermark embedding approach [9] to hide information within the host video frame. The structure of the quantization lattice is self-adapting depending on L x and L y .…”
Section: The Ncg-geometric-warping Approachmentioning
confidence: 99%
“…Therefore, every wavelet coefficient w of the transformed image is quantized to an invariant value, which is not changed during the signature embedding process [9]. Except for the dead-zone, the magnitude of every coefficient is set to the centre of the according δ-sized hash interval, in Figure 9 marked with the symbols .…”
Section: Feature Extraction In the Dwt-domainmentioning
confidence: 99%
See 1 more Smart Citation