Security for Watermark Image

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A hierarchical image authentication watermark with improved localization and security

Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to improve security. Using a hierarchical structure, we propose a method that thwarts the VQ attack while sustaining the superior localization properties of blockwise independent watermarking methods. In particular, we propo...

متن کامل

Reversible Authentication Watermark for Image

(invertible, lossless) authentication draws much attention recently for its ability to restore the original image from marked image without any distortions upon verification. In this paper, we propose a reversible water-marking scheme for image authentication based on histogram modification in integer wavelet transform (IWT) domain. The proposed scheme has features: i) Reversibility, high embed...

متن کامل

Stochastic Image Warping for Improved Watermark Desynchronization

The use of digital watermarking in real applications is impeded by the weakness of current available algorithms against signal processing manipulations leading to the de-synchronization of the watermark embedder and detector. For this reason, the problem of watermarking under geometric attacks has received considerable attention throughout recent years. Despite their importance, only few classe...

متن کامل

Digital watermark technology in security applications

of Digital Watermark Technology in Security Applications

متن کامل

Embedding Watermark: the way to improve Security

Digital watermarking is a process of embedding unobtrusive marks or labels into digital content. These embedded marks are typically imperceptible (invisible) that can later be detected or extracted. This paper describes watermarking process and attacks on watermarks. Also a focus is made on various techniques of implementing watermarks. In general, any watermarking scheme consists of three part...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY

سال: 2013

ISSN: 2278-5612

DOI: 10.24297/ijmit.v3i1.4645