In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small number of cryptography based secure authentication methods are available for binary images. In a cryptography based authentication watermarking, a message authentication code (or digital signature) of the whole image is computed and the resulting code is inserted into the image itself. This paper proposes a new authentication watermarking method for binary images. The main idea is to use the prioritized sub-blocks by pattern matching scheme to embed the code. Shuffling is applied before embedding to equalize the uneven embedding capacity. It detects any alteration while maintain...
[[abstract]]Many commercial documents are easily transmitted via FAX or Internet. This paper explore...
[[abstract]]Many commercial documents are easily transmitted via FAX or Internet. This paper explore...
We propose a watermarking scheme for the authentication of binary images. We transform the image usi...
Abstract. In image authentication watermarking, hidden data is in-serted into an image to detect any...
In this paper, we propose a new perception based watermarking algorithm in binary document images fo...
In this paper, we propose a new perception based watermarking algorithm in binary document images fo...
In this paper, we propose a new secure authentication method in binary document images using erasabl...
The digital signature and watermarking methods are used for image authentication. Digital signature ...
The existing watermarking methods for binary images either have low embedding capacity or have poor ...
In this thesis, we propose different data hiding techniques for authentication of binary images. Iss...
In this thesis, we propose different data hiding techniques for authentication of binary images. Iss...
A new data hiding scheme for binary image authentication that has a small distortion of the cover im...
[[abstract]]A new approach to binary image authentication in multimedia communication with distortio...
[[abstract]]In this paper, an image authentication technique by embedding digital `watermarks' into ...
Abstract. An authentication watermark is a hidden data inserted into an image that allows detecting ...
[[abstract]]Many commercial documents are easily transmitted via FAX or Internet. This paper explore...
[[abstract]]Many commercial documents are easily transmitted via FAX or Internet. This paper explore...
We propose a watermarking scheme for the authentication of binary images. We transform the image usi...
Abstract. In image authentication watermarking, hidden data is in-serted into an image to detect any...
In this paper, we propose a new perception based watermarking algorithm in binary document images fo...
In this paper, we propose a new perception based watermarking algorithm in binary document images fo...
In this paper, we propose a new secure authentication method in binary document images using erasabl...
The digital signature and watermarking methods are used for image authentication. Digital signature ...
The existing watermarking methods for binary images either have low embedding capacity or have poor ...
In this thesis, we propose different data hiding techniques for authentication of binary images. Iss...
In this thesis, we propose different data hiding techniques for authentication of binary images. Iss...
A new data hiding scheme for binary image authentication that has a small distortion of the cover im...
[[abstract]]A new approach to binary image authentication in multimedia communication with distortio...
[[abstract]]In this paper, an image authentication technique by embedding digital `watermarks' into ...
Abstract. An authentication watermark is a hidden data inserted into an image that allows detecting ...
[[abstract]]Many commercial documents are easily transmitted via FAX or Internet. This paper explore...
[[abstract]]Many commercial documents are easily transmitted via FAX or Internet. This paper explore...
We propose a watermarking scheme for the authentication of binary images. We transform the image usi...