A Simple Approach on Image Authentication Watermarking
نویسندگان
چکیده
منابع مشابه
A Simple Approach on Image Authentication Watermarking
An ideal watermarking scheme is a technique of embedding secret information into the image in order toauthenticate the image. This helps in detecting The integrity of the image. Here a block based Watermarking technique has been sed. A Fuzzy C means based algorithm is used here to Watermark and authenticate the image Experimental result here show that it can detect maximum modification and it c...
متن کاملWatermarking for Image Authentication
A data embedding method is proposed for image authentication based on table look-up in frequency domain. A visually meaningful watermark and a set of simple features are embedded invisibly in the marked image, which can be stored in the compressed form. The scheme can detect and localize alterations of the original image, such as the tempering of images exported from a digital camera.
متن کاملMulti-resolution Image Authentication Watermarking Based on Progressive Image Transmission
In this paper, a watermarking for multi-resolution image authentication is proposed. The most important image content with progressive characteristic is taken as the authentication code. The authentication code is then embedded/extracted according to multi-resolution image coding. The experimental results show the validity of the proposed scheme. The significant tampering can be detected firstl...
متن کاملA Study on Watermarking Schemes for Image Authentication
The digital revolution in digital image processing has made it possible to create, manipulate and transmit digital images in a simple and fast manner. The adverse affect of this is that the same image processing techniques can be used by hackers to tamper with any image and use it illegally. This has made digital image safety and integrity the top prioritized issue in today’s information explos...
متن کاملA Study on Watermarking Schemes for Image Authentication
The digital revolution in digital image processing has made it possible to create, manipulate and transmit digital images in a simple and fast manner. The adverse affect of this is that the same image processing techniques can be used by hackers to tamper with any image and use it illegally. This has made digital image safety and integrity the top prioritized issue in today’s information explos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/11439-6851