Image Watermarking for Identification Forgery Prevention
نویسندگان
چکیده
منابع مشابه
Computerized Image Processing for Forgery Prevention
The issue of copyright protection for digital media has become a problem with rapid advancements in online media storage. As more of these storage systems are made, more information will be taken from them. For all of the good that comes from new technology, an equal amount of illegal activity can spore from it. Digital watermarking has become one of the most popular copyright protection method...
متن کاملForgery Detection Using Chaotic Watermarking in Image Key Areas
Preliminary communication In this paper we study watermarking algorithm for compressed images in the application of antiforgery in financial bills. First, the basic watermarking algorithm based on image edge information is studied. The encrypted watermark is converted into binary values and embedded into the edges, meanwhile the original edge shape is preserved from noticeable destruction. Seco...
متن کاملTwo Novel Chaos-Based Algorithms for Image and Video Watermarking
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...
متن کاملDigital Watermarking for Forgery Detection in Printed Materials
Forgery prevention and detection are of great social importance.This paper attempts to apply digital watermarking into forgery prevention.To embed a watermark,the wavelet transformation is first applied to the original image and the corresponding approximation image and detail images are obtained.The digital watermark is embedded into the most important DCT coefficients of the approximation ima...
متن کاملFaster Batch Forgery Identification
Batch signature verification detects whether a batch of signatures contains any forgeries. Batch forgery identification pinpoints the location of each forgery. Existing forgery-identification schemes vary in their strategies for selecting subbatches to verify (individual checks, binary search, combinatorial designs, etc.) and in their strategies for verifying subbatches. This paper exploits syn...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Korea Contents Association
سال: 2011
ISSN: 1598-4877
DOI: 10.5392/jkca.2011.11.12.552