𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A watermarking-based image ownership and tampering authentication scheme

✍ Scribed by Chin-Chen Chang; Yih-Shin Hu; Tzu-Chuen Lu


Publisher
Elsevier Science
Year
2006
Tongue
English
Weight
368 KB
Volume
27
Category
Article
ISSN
0167-8655

No coin nor oath required. For personal study only.

✦ Synopsis


Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and detect malicious manipulation over embedded images. In the scheme, the authentication data of an image will be inserted into adaptive least significant bits of the embedded pixels. And the number of the least significant bits will be determined according to the type of the corresponding block. The experimental results show that the quality of the embedded image is very high, and the positions of the tampered parts are located correctly.


πŸ“œ SIMILAR VOLUMES


Tampering with a watermarking-based imag
✍ Raphael C.-W. Phan πŸ“‚ Article πŸ“… 2008 πŸ› Elsevier Science 🌐 English βš– 163 KB

We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439--446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and

A tamper-proof and lightweight authentic
✍ Ghaith Hammouri; ErdinΓ§ Γ–ztΓΌrk; Berk Sunar πŸ“‚ Article πŸ“… 2008 πŸ› Elsevier Science 🌐 English βš– 689 KB

## a b s t r a c t We present a tamper-proof and lightweight challenge-response authentication scheme, based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, which shows the scheme to be secure against passive attacks, provided that it is hard to learn a thr

A PCA-based watermarking scheme for tamp
✍ Qijun Zhao; Hongtao Lu πŸ“‚ Article πŸ“… 2005 πŸ› Elsevier Science 🌐 English βš– 161 KB

This paper presents a novel watermarking scheme for tamper-proof of web pages. It overwhelms existing methods of watermarking and Hash in that it does not increase the file size. Experimental results are promising.

A secure authentication watermarking for
✍ Hae Yong Kim; Amir Afif πŸ“‚ Article πŸ“… 2004 πŸ› John Wiley and Sons 🌐 English βš– 152 KB

## Abstract An authentication watermark is a hidden data inserted into an image that can be used to detect any accidental or malicious alteration in the image. Many authentication‐watermarking techniques for continuous‐tone images are described in the literature, but only a quite small number of se