IEEE International Conference on Image Processing 2005 2005
DOI: 10.1109/icip.2005.1530246
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking JBIG2 text region for image authentication

Abstract: A template ranking with all possible 3×3 templates (mirrors, rotations and reverses of each pattern have the same score).

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…The resultant images are named as MAX and MIN. the threshold image T, which represents the threshold levels for all pixels in Gray, is produced by using relation (2). Then, the Gray is matched against T to produce the binary image Binary, by applying the relation (3).…”
Section: A the Image Binarizationmentioning
confidence: 99%
See 1 more Smart Citation
“…The resultant images are named as MAX and MIN. the threshold image T, which represents the threshold levels for all pixels in Gray, is produced by using relation (2). Then, the Gray is matched against T to produce the binary image Binary, by applying the relation (3).…”
Section: A the Image Binarizationmentioning
confidence: 99%
“…It is often true that a large part of these images is confidential, private or both, which increases the demand for stronger protection and authentication schemes [1]. "Data Hiding" schemes are the preferred techniques for protecting the transmitted image data [2]. A "Data Hiding" scheme means a technique to embed a sequence of bits in a host image with small visual aspect and to extract it afterwards [3].…”
Section: Introductionmentioning
confidence: 99%
“…Queiroz and we have very recently proposed an AWT for JBIG2-encoded images (possibly lossy-compressed), named AWTRJ (Authentication Watermarking by Template Ranking for JBIG2) [7]. Unfortunately, AWTRJ (especially its public-key version) can be assaulted by parity attacks.…”
Section: Raphymentioning
confidence: 99%
“…To the best of our knowledge, Queiroz and we have proposed the only AWT for JBIG2-encoded binary images (possibly lossy-compressed) [7]. This technique is named AWTRJ (Authentication Watermarking by Template Ranking for JBIG2).…”
Section: Awtrjmentioning
confidence: 99%
“…The computed signature is embedded into 3 × 3 blocks of the image. In [8], a message authentication code is embedded into a JBIG-2 binary image by modifying the positions of symbols. In [9], a two-layer blind binary image authentication scheme was proposed.…”
Section: Introductionmentioning
confidence: 99%