Recent Trends in Image Watermarking for Authentication and Tamper Detection using Various Approch: A Survey
نویسندگان
چکیده
A digital watermark is a used for identification of embedded data in a noise tolerant signal such as image data. It is used to identify ownership of the data. "Watermarking" is the process of hiding digital information in a carrier signal. Embedding a digital signal is called as watermarking. Robust Watermark is well suited for copyright protection because they stay intact with image under various manipulations. Security issues regarding images are important because images are used in electronic media. In this paper we discuss the issues like robustness, security, compression, capacity and fault-tolerance of these watermarking methods.
منابع مشابه
Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملIntelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms
Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...
متن کاملTwo Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...
متن کاملTwo Fragile Encryption-Watermarking Combined Schemes for Image Authentication with Tamper Detection and Localization
This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کامل