We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439--446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and
A watermarking-based image ownership and tampering authentication scheme
β Scribed by Chin-Chen Chang; Yih-Shin Hu; Tzu-Chuen Lu
- Publisher
- Elsevier Science
- Year
- 2006
- Tongue
- English
- Weight
- 368 KB
- Volume
- 27
- Category
- Article
- ISSN
- 0167-8655
No coin nor oath required. For personal study only.
β¦ Synopsis
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malicious manipulation over embedded images. In the scheme, the authentication data of an image will be inserted into adaptive least significant bits of the embedded pixels. And the number of the least significant bits will be determined according to the type of the corresponding block. The experimental results show that the quality of the embedded image is very high, and the positions of the tampered parts are located correctly.
π SIMILAR VOLUMES
## a b s t r a c t We present a tamper-proof and lightweight challenge-response authentication scheme, based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, which shows the scheme to be secure against passive attacks, provided that it is hard to learn a thr
This paper presents a novel watermarking scheme for tamper-proof of web pages. It overwhelms existing methods of watermarking and Hash in that it does not increase the file size. Experimental results are promising.
## Abstract An authentication watermark is a hidden data inserted into an image that can be used to detect any accidental or malicious alteration in the image. Many authenticationβwatermarking techniques for continuousβtone images are described in the literature, but only a quite small number of se