We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439--446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and
A novel image watermarking scheme based on amplitude attack
โ Scribed by Chaur-Heh Hsieh; Chi-Jen Liao
- Publisher
- Elsevier Science
- Year
- 2007
- Tongue
- English
- Weight
- 679 KB
- Volume
- 40
- Category
- Article
- ISSN
- 0031-3203
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and dete
Difference expansion is widely used in reversible watermarking for raster images, but it cannot be applied to data with low correlation, due to its large distortion. In this paper, an improvement is made to difference expansion technology to make it suitable for two-dimensional (2D) computer-aided d