EUROCON 2005 - The International Conference on "Computer as a Tool" 2005
DOI: 10.1109/eurcon.2005.1630103
|View full text |Cite
|
Sign up to set email alerts
|

Watermark Generation using Image-dependent Key for Image Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The robustness of the approach (Kitanovski et al, 2005) was improved by the methods (Moosazadeh&Ekbatanifard,2017)and (Pun,2009)thatprovidehighrobustnessagainstJPEG compression.SomeoftheapproachesbasedonDCTusethehighfrequencycoefficientstoembed the watermark. This approach (Pun, 2009) The DCT based embedding can be applied to both grayscale and color images, where the author(Loanetal.,2018)usedchaoticencryption.Theembeddingprocessisreplicatedthricefor RGBchannelsiftheDCTapproachisappliedoncolorimages.Thewatermarkisembeddedon theadjacentblock'sDCTcoefficients.Arnoldtransformisalsousedtoimprovetheencryption providedinthechaoticmap.FromthestudiesofDCTbasedwatermarking,itisunderstandable thatthewatermarkingcanbedoneonlower-ordercoefficientsthanonhigher-ordercoefficients.…”
Section: Discrete Cosine Transform (Dct)mentioning
confidence: 99%
“…The robustness of the approach (Kitanovski et al, 2005) was improved by the methods (Moosazadeh&Ekbatanifard,2017)and (Pun,2009)thatprovidehighrobustnessagainstJPEG compression.SomeoftheapproachesbasedonDCTusethehighfrequencycoefficientstoembed the watermark. This approach (Pun, 2009) The DCT based embedding can be applied to both grayscale and color images, where the author(Loanetal.,2018)usedchaoticencryption.Theembeddingprocessisreplicatedthricefor RGBchannelsiftheDCTapproachisappliedoncolorimages.Thewatermarkisembeddedon theadjacentblock'sDCTcoefficients.Arnoldtransformisalsousedtoimprovetheencryption providedinthechaoticmap.FromthestudiesofDCTbasedwatermarking,itisunderstandable thatthewatermarkingcanbedoneonlower-ordercoefficientsthanonhigher-ordercoefficients.…”
Section: Discrete Cosine Transform (Dct)mentioning
confidence: 99%
“…Note that watermark extraction can be done in a reverse way. The method proposed by Kitanovski [77] performs a block-based DCT transform in each of the blocks after dividing an image into P × P blocks and embeds a watermark generated using an image hash as a key in the low-frequency components using quantization index modulation (QIM). In QIM, only one watermark bit is inserted into each DCT block.…”
Section: Discrete Cosine Transform (Dct)mentioning
confidence: 99%
“…This is difficult to implement and shows weak performance against geometric transformation attacks, such as scaling, rotation, and cropping. A DCT/IDCT method has been proposed for ensuring effectiveness [80], in which a digital The method proposed by Kitanovski [77] performs a block-based DCT transform in each of the blocks after dividing an image into P × P blocks and embeds a watermark generated using an image hash as a key in the low-frequency components using quantization index modulation (QIM). In QIM, only one watermark bit is inserted into each DCT block.…”
Section: Discrete Cosine Transform (Dct)mentioning
confidence: 99%
“…The method proposed in (Kitanovski et al, 2005) divided an image into P×P blocks, after which performed a block-based DCT transform in each blocks and embedded in the lowfrequency components one watermark bit per block. A watermark was generated using an image hash as a key.…”
Section: Related Workmentioning
confidence: 99%