Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure
نویسندگان
چکیده
منابع مشابه
Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure
The paper describes methods for generating image watermark for asymmetric key based watermark embedding and detection scheme in wavelet domain. The proposed method combines DWT-based watermarking and the ability to verify watermark using reliable methods of asymmetric coding. The watermark scheme is developed to be directly incorporated into JPEG2000 image coding standard, while it can be used ...
متن کاملOn Key Agreement Protocols Based on Tamper-Proof Hardware
A key agreement (or distribution) protocol is a set of communication rules whereby two users can establish a shared common key. The shared key can be used by the users in future secure communications. We analyze a key agreement protocol presented by Leighton and Micali at the CRYlTO’93 conference, which is based on tamper-proof hardware, and show that the protocol fails in that a common key sha...
متن کاملImage Watermarking for Tamper Detection
We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from nonmalicious changes resulting from common image processing operations. The technique can be implemented with small memory and computational...
متن کاملOblivious Image Watermarking Technique for Tamper Detection
In this paper I propose an oblivious watermarking technique for tamper detection in digital images. With comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from non-malicious changes resulting from common image processing operations. This technique can be implemented with small memory ...
متن کاملA Software Watermarking based on PE File with Tamper-proof Function
After embedding the watermark based on the algorithm of PE file resources section, the data of resource section was still easy to be rearranged, so this paper put forward a new watermark algorithm with the function of anti-tamper. The new algorithm still used watermark information to control the order of software resource structure’s nodes, and hid the watermark information in the rearranged re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Informatica
سال: 2005
ISSN: 0868-4952,1822-8844
DOI: 10.15388/informatica.2005.085