RST Invariant Fragile Watermarking for 2D Vector Map Authentication

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RST Invariant Fragile Watermarking for 2D Vector Map Authentication

2D vector maps are very important data in geographical information systems (GISs). It is considered to be content for which verification of integrity and authentication are urgently required. Using a marking technique and a rotation, scaling and translation (RST) invariant watermark generation method, we propose a scheme that detects and locates malicious attacks with high accuracy while provid...

متن کامل

A Fragile Associative Watermarking on 2D Barcode for Data Authentication

Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing with watermark technique on 2D barcode to prevent it from counterfeited or prepensely tampered. The existent methods still have to limit the size of embedded watermark in a relatively small portion. Furthermore, it als...

متن کامل

Scalable fragile watermarking for image authentication

Semi-fragile watermarks are used to detect unauthorised changes to an image, whereas tolerating allowed changes such as compression. Most semi-fragile algorithms that tolerate compression assume that because compression only removes the less visually significant data from an image, tampering with any data that would normally be removed by compression cannot affect a meaningful change to the ima...

متن کامل

Fragile Watermarking for Image Authentication: Survey

In this paper, we report results from comparative study on various related and relevant aspects of the digital watermarking such as image authentication techniques using fragile watermarking, fuzzy clustering and genetically inspired watermarking techniques for integrity verification. This is carried out with intent to develop an understanding of their working, contained challenges, possible at...

متن کامل

Hierarchical Fragile Watermarking Scheme For Image Authentication

In this paper, a simple hierarchical fragile watermarking scheme for image authentication is proposed. The important features and parity bits of an image are embedded by modifying the pixel value of the host image. Once an image is tampered by other users or corrupted by transmission, the parity bits and important features can be used to detect and recover the image. The method is effective bec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Multimedia and Ubiquitous Engineering

سال: 2015

ISSN: 1975-0080

DOI: 10.14257/ijmue.2015.10.4.16