Literature DB >> 18255501

Secret and public key image watermarking schemes for image authentication and ownership verification.

P W Wong1, N Memon.   

Abstract

We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark, indicating the image is authentic and has not been changed since the insertion of the watermark. Any modification would be reflected in a corresponding error in the watermark. If the key is incorrect, or if the image was not watermarked, or if the watermarked image is cropped, the watermark extraction algorithm will return an image that resembles random noise. Since it requires a user key during both the insertion and the extraction procedures, it is not possible for an unauthorized user to insert a new watermark or alter the existing watermark so that the resulting image will pass the test. We present secret key and public key versions of the technique.

Year:  2001        PMID: 18255501     DOI: 10.1109/83.951543

Source DB:  PubMed          Journal:  IEEE Trans Image Process        ISSN: 1057-7149            Impact factor:   10.856


  6 in total

1.  Tamper detection and recovery for medical images using near-lossless information hiding technique.

Authors:  Jeffery H K Wu; Ruey-Feng Chang; Chii-Jen Chen; Ching-Lin Wang; Ta-Hsun Kuo; Woo Kyung Moon; Dar-Ren Chen
Journal:  J Digit Imaging       Date:  2007-03-28       Impact factor: 4.056

2.  Lossless watermarking for verifying the integrity of medical images with tamper localization.

Authors:  Xiaotao Guo; Tian-ge Zhuang
Journal:  J Digit Imaging       Date:  2008-05-13       Impact factor: 4.056

3.  A review of medical image watermarking requirements for teleradiology.

Authors:  Hussain Nyeem; Wageeh Boles; Colin Boyd
Journal:  J Digit Imaging       Date:  2013-04       Impact factor: 4.056

4.  PDE based scheme for multi-modal medical image watermarking.

Authors:  N Aherrahrou; H Tairi
Journal:  Biomed Eng Online       Date:  2015-11-25       Impact factor: 2.819

5.  Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

Authors:  Mohammed S Khalil; Fajri Kurniawan; Muhammad Khurram Khan; Yasser M Alginahi
Journal:  ScientificWorldJournal       Date:  2014-05-29

6.  Reversible Data Hiding in Encrypted Image Based on (7, 4) Hamming Code and UnitSmooth Detection.

Authors:  Lin Li; Chin-Chen Chang; Chia-Chen Lin
Journal:  Entropy (Basel)       Date:  2021-06-22       Impact factor: 2.524

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.