With the increasing popularity of JPEG images, a need arises to devise effective watermarking techniques which consider JPEG compression as an acceptable manipulation. In this paper, we present a semi-fragile watermarking scheme which embeds a watermark in the quantized DCT domain. It is tolerant to JPEG compression to a pre-determined lowest quality factor, but is sensitive to all other malicious attacks, either in spatial or transform domains. Feature codes are extracted based on the relative sign and magnitudes of coefficients, and these are invariant due to an important property of JPEG compression. The employment of a nine-neighborhood mechanism ensures that non-deterministic block-wise dependence is achieved Analysis and experimental ...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing...
Techniques to establish the authenticity and integrity of digital images are becom-ing increasingly ...
Abstract We propose a content-based semi-fragile watermarking algorithm for image authentication. In...
[[abstract]]We propose an adaptive watermarking technique that is robust to JPEG compression and sen...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragil...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed, which ...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
This paper presents a robust image authentication approach that distinguishes malicious attacks from...
Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conv...
It is a common practice in transform-domain fragile watermarking schemes for authentication purposes...
[[abstract]]This paper presents a robust image authentication approach that distinguishes malicious ...
Authentication of multimedia contents has gained much attention in recent times. In this paper, we p...
In this report, the concept of robust and semi-fragile watermarking is described for copyright prote...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing...
Techniques to establish the authenticity and integrity of digital images are becom-ing increasingly ...
Abstract We propose a content-based semi-fragile watermarking algorithm for image authentication. In...
[[abstract]]We propose an adaptive watermarking technique that is robust to JPEG compression and sen...
Image watermarking is most often used to prove that an image belongs to someone and to make sure tha...
[[abstract]]Computer network and digitized information, which bring the convenience of spreading and...
Robust watermarks are suitable for copyright protection in a DRM scenario. On the other hand, fragil...
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed, which ...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
This paper presents a robust image authentication approach that distinguishes malicious attacks from...
Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conv...
It is a common practice in transform-domain fragile watermarking schemes for authentication purposes...
[[abstract]]This paper presents a robust image authentication approach that distinguishes malicious ...
Authentication of multimedia contents has gained much attention in recent times. In this paper, we p...
In this report, the concept of robust and semi-fragile watermarking is described for copyright prote...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing...
Techniques to establish the authenticity and integrity of digital images are becom-ing increasingly ...
Abstract We propose a content-based semi-fragile watermarking algorithm for image authentication. In...