Fragile watermarking using the VW2D watermark
نویسندگان
چکیده
Two classes of digital watermarks have been developed to protect the copyright ownership of digital images. Robust watermarks are designed to withstand attacks on an image (such as compression or scaling), while fragile watermarks are designed to detect minute changes in an image. Fragile marks can also identify where an image has been altered. This paper compares two fragile watermarks. The first method uses a hash function to obtain a digest of the image. An altered or forged version of the original image is then hashed and the digest is compared to the digest of the original image. If the image has changed the digests will be different. We will describe how images can be hashed so that any changes can be spatially localized. The second method uses the Variable-Watermark Two-Dimensional algorithm (VW2D) [1]. The sensitivity to changes is user-specific. Either no changes can be permitted (similar to a hard hash function), or an image can be altered and still be labeled authentic. Latter algorithms are known as semi-fragile watermarks. We will describe the performance of these two techniques and discuss under what circumstances one would use a particular technique.
منابع مشابه
Robust and Semi-fragile Watermarking Techniques for Image Content Protection
......................................................................................................................... 2 Acknowledgements ........................................................................................................ 3 1.0 Introduction .............................................................................................................. 4 1.1 Aims and Object...
متن کاملFragile Watermarking Using Subband Coding
The paper deals with a new technique of fragile image watermarking. Proposed technique exploits inter-subband dependencies in order to minimize the influence of inserted watermark on the host image quality. Using the unique watermark based on the low-frequency subband, proposed scheme is resistant against attacks based on series of images analysis. Tampering detection ability of the proposed te...
متن کاملTwo Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...
متن کاملA Fragile Watermarking Scheme for Authentication of GIF Images
Fragile image watermarking could be used to authenticate a digital image due to modification or altering. A watermark is embedded into the image. When the image was modified or altered, the watermark is also altered or fragile. One of popular image format is GIF image. Some fragile watermarking algorithms are applied to the single GIF image only, none for animated images. However, we could modi...
متن کاملTwo Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999