Multiple Watermark for Authentication and Tamper Detection using Mixed scales DWT

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Medical Image Multiple Watermark Using 4-level Dwt

In this paper we propose a novel approach for medical image security during their transmission over the network. Medical images like CT, MRI, X-ray contain the patients’ vital and confidential information. During transmission over network, it may face different attacks. To prevent such mishaps, embedding of watermark technique is used. In the proposed method, we propose to embed multiple waterm...

متن کامل

Multiple Watermark Method for Privacy Control and Tamper Detection in Medical Images

Medical images in digital form must be stored in a secure way to preserve stringent image quality standards and prevent unauthorised disclosure of patient data. This paper proposes a multiple watermarking method to serve these purposes. A multiple watermark consists of an annotation part and a fragile part. Encrypted patient data can be embedded in an annotation watermark, and tampering can be ...

متن کامل

A Digital Watermarking Algorithm for Authentication and Tamper Detection

An important element of a communications system is the trustworthiness of the data being received, especially where the data must travel through insecure channels or pass through several hands. Digital watermarking provides a partial solution to the problem of trustworthiness, especially with regard to image and video data. This paper describes a hybrid watermarking algorithm that combines robu...

متن کامل

Digital Watermark based Authentication for Intrusion Detection of Digital Substations

The paper proposes the use of digital watermark based authentication for intrusion detection in IEC 61850automated substations. The watermark can be embedded into the Least Significant Bits of the measurements without visible deterioration in precision. When Intelligent Electronics Devices gets measurements, the watermark in the measurement can be retrieved to determine whether it has been atta...

متن کامل

Public Watermark Detection Using Multiple Proxies and Secret Sharing

A central issue in public watermarking schemes is the design of a detector that will not reveal sufficient information that leads to the erasure of embedded watermark, even if an adversary knows the detection algorithm and the public detection key (if any). Insofar, there is no such detector in “stand-alone” setting that achieves satisfactory security requirements. Recently, [1] gives a zero-kn...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2011

ISSN: 0975-8887

DOI: 10.5120/3389-4704