𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Secret and public key image watermarking schemes for image authentication and ownership verification

✍ Scribed by Ping Wah Wong; Memon, N.


Book ID
118142531
Publisher
IEEE
Year
2001
Tongue
English
Weight
267 KB
Volume
10
Category
Article
ISSN
1057-7149

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Secret and public key image watermarking
✍ Ping Wah Wong; Memon, N. πŸ“‚ Article πŸ“… 2001 πŸ› IEEE 🌐 English βš– 267 KB

We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct

A watermarking-based image ownership and
✍ Chin-Chen Chang; Yih-Shin Hu; Tzu-Chuen Lu πŸ“‚ Article πŸ“… 2006 πŸ› Elsevier Science 🌐 English βš– 368 KB

Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and dete

A secure authentication watermarking for
✍ Hae Yong Kim; Amir Afif πŸ“‚ Article πŸ“… 2004 πŸ› John Wiley and Sons 🌐 English βš– 152 KB

## Abstract An authentication watermark is a hidden data inserted into an image that can be used to detect any accidental or malicious alteration in the image. Many authentication‐watermarking techniques for continuous‐tone images are described in the literature, but only a quite small number of se