RST Invariant Fragile Watermarking for 2D Vector Map Authentication
نویسندگان
چکیده
منابع مشابه
RST Invariant Fragile Watermarking for 2D Vector Map Authentication
2D vector maps are very important data in geographical information systems (GISs). It is considered to be content for which verification of integrity and authentication are urgently required. Using a marking technique and a rotation, scaling and translation (RST) invariant watermark generation method, we propose a scheme that detects and locates malicious attacks with high accuracy while provid...
متن کاملA Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing with watermark technique on 2D barcode to prevent it from counterfeited or prepensely tampered. The existent methods still have to limit the size of embedded watermark in a relatively small portion. Furthermore, it als...
متن کاملScalable fragile watermarking for image authentication
Semi-fragile watermarks are used to detect unauthorised changes to an image, whereas tolerating allowed changes such as compression. Most semi-fragile algorithms that tolerate compression assume that because compression only removes the less visually significant data from an image, tampering with any data that would normally be removed by compression cannot affect a meaningful change to the ima...
متن کاملFragile Watermarking for Image Authentication: Survey
In this paper, we report results from comparative study on various related and relevant aspects of the digital watermarking such as image authentication techniques using fragile watermarking, fuzzy clustering and genetically inspired watermarking techniques for integrity verification. This is carried out with intent to develop an understanding of their working, contained challenges, possible at...
متن کاملHierarchical Fragile Watermarking Scheme For Image Authentication
In this paper, a simple hierarchical fragile watermarking scheme for image authentication is proposed. The important features and parity bits of an image are embedded by modifying the pixel value of the host image. Once an image is tampered by other users or corrupted by transmission, the parity bits and important features can be used to detect and recover the image. The method is effective bec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Multimedia and Ubiquitous Engineering
سال: 2015
ISSN: 1975-0080
DOI: 10.14257/ijmue.2015.10.4.16