Learn More
Creation and distribution of digital media has become part of daily life. Digital images are used in many fields but authenticity of an image is needed if it is used as evidence in a courtroom. Thus, development of techniques to ensure image authenticity is an active research topic. Passive methods make use of statistical features of images to judge(More)
— Visual Secret Sharing (VSS) is a method to encode a secret image into multiple shares. Coding one pixel of secret image into m sub-pixels in shares during encoding process causes pixel expansion problem. Probabilistic Visual Secret Sharing Scheme (PVSS) are proposed in recent years to overcome this problem. In traditional VSS and PVSS methods, human(More)
The Chinese Remainder Theorem (CRT) is used for secret sharing by both Mignotte and Asmuth Bloom in 1983. Then Shyu et al. used Mignotte's scheme in the field of secret image sharing in 2008. However, their method use a Pseudo Random Number Generator (PRNG) with a seed to generate different pixel values for the consecutive secret pixels that have the same(More)
Visual secret sharing (VSS) is a method to scatter a secret image into shares of random patterns that have to be stacked together to reconstruct the secret. Since each share is a random pattern of black and white pixels, it is not enough to rebuild the secret from just one share. Stacking two shares reconstructs the first secret whereas rotating the first(More)
The increase in the number of image processing tools to edit digital images and their ease of use have driven the need for image authentication techniques. A technique called Digital Watermarking based on hiding special codes in image has gained popularity among all other authentication techniques. An active research topic is to reconstruct the watermark(More)
Nowadays several modifications on the digital images are made with the rapid development of image editing tools in recent years. The most common method in the modifications made is copy-move forgery. Majority of the proposed methods to detect copy-move forgery in the literature are based on block and not resistant to various geometric transformation before(More)
Digital rights management problem has become a critical issue due to the increasing number of database applications. Proposed watermarking methods to deal with copyright management problem of multimedia cannot be applied to the databases directly. Some methods that watermark the databases use the date fields in the relation. In this work, we propose a(More)
Medical image transmission over local or wide area networks has become popular with the rapid development of the networking technologies. Research on secure medical image transmission reported in the literature has two objectives. Providing integrity and authentication of the transferred image is one the objectives. Hiding electronic patient records on(More)
Protecting database integrity has become a matter of increasing importance nowadays as accessing information is getting easier. Therefore, database watermarking approach to protect the integrity become an active research area. Most of the existing relational database watermarking techniques embed a generated watermark in the database. Zero watermarking is(More)
Medical imaging and information management systems require transmission of medical images over the Internet. Many image watermarking techniques have been proposed in recent years to ensure the integrity and authenticity of medical images transferred over insecure networks. In this work, we propose a new medical image watermarking technique to detect(More)