• Corpus ID: 2993708

A Review of Fragile Image Watermarks

@inproceedings{Lin2007ARO,
  title={A Review of Fragile Image Watermarks},
  author={Eugene T. Lin and Edward J. Delp},
  year={2007}
}
1. ABSTRACT Many image watermarks have been proposed to protect intellectual property in an age where digital images may be easily modified and perfectly reproduced. In a fragile marking system, a signal (watermark) is embedded within an image such that subsequent alterations to the watermarked image can be detected with high probability. The insertion of the watermark is perceptually invisible under normal human observation. These types of marks have found applicability in image authentication… 
Invertible chaotic fragile watermarking for robust image authentication
Abstract Fragile watermarking is a popular method for image authentication. In such schemes, a fragile signal that is sensitive to manipulations is embedded in the image, so that it becomes
Image authentication by means of fragile CGH watermarking
TLDR
This paper proposes a fragile marking system based on Computer Generated Hologram coding techniques, which is able to detect malicious tampering while tolerating some incidental distortions, and introduces an encryption method using a asymmetric Cryptography.
A Semi-Fragile Image Watermarking Resisting to JPEG
TLDR
A semi-fragile watermarking algorithm to resist JPEG is proposed based on the fact that most of the coefficients of high frequency have the same relative energy relations after JPEG compression.
A Dual Digital-Image Watermarking Technique
TLDR
A watermarking technique is suggested that incorporates two watermarks in a host image for improved protection and robustness and was tested using Lena image as a host and the camera man as the primary watermark.
A DCT-Based Watermarking Technique for Image Authentication
TLDR
This paper presents a novel DCT-based watermarking method for image authentication that embeds one watermark bit in each DCT block by shifting a randomly selected coefficient to have a mapped value, in a coefficient-binary-mapping function, that is identical to the water mark bit.
Semi-fragile watermark for visual content authentication
TLDR
This paper proposes semi-fragile watermarking scheme to authenticate visual content of the image and provides high security and it facilitates to locate the tampered region in the image.
A New Watermark-embedded Image Generation for Display-capture based Mobile Watermarking
TLDR
The proposed mobile watermarking scheme is a new concept for embedding, which uses the generated image instead of a given original image to generate a proper MMB (Mobile Merchandise Bond) image for the watermark to be inserted.
A Feature-Based Digital Image Watermarking for Copyright Protection and Content Authentication
TLDR
The experimental results show that the proposed watermarking algorithm can resist most removal and geometric attacks and changes or modifications of an image will be reflected in the authors' hidden watermarks.
An Overview: Watermarking Approach for Digital Images
In this paper, we study different watermarking approaches for digital images. a robust watermarking framework to embed a color watermark is presented. To perform a color image as watermark, The
Research on an Advanced Novel Watermarking Technology with Higher Robustness
  • Gengming Zhu
  • Mathematics, Computer Science
    2008 International Symposium on Electronic Commerce and Security
  • 2008
TLDR
One new advanced watermarking technology is presented in the paper, which incorporates two watermarks in an image to improve the protection and robustness.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 21 REFERENCES
Invisible watermarking for image verification
TLDR
A new method for invisibly watermarking high-quality color and gray-scale images intended for use in image verification applications to determine whether the content of an image has been altered, due perhaps, to the act of a malicious party.
A watermark for digital images
TLDR
This work describes two techniques for the invisible marking of images and analyzes the robustness of the watermarks with respect to linear and nonlinear filtering, and JPEG compression.
A Watermark for Image Integrity and Ownership Verification
TLDR
The invisible authentication watermark inherits the security of a cryptographic hash fun tion, hence it is computationally infeasible for any user to confuse the image integrity or owners by forgery.
Fragile watermarking using the VW2D watermark
TLDR
This paper compares two fragile watermarks and describes how images can be hashed so that any changes can be spatially localized and under what circumstances one would use a particular technique.
A public key watermark for image verification and authentication
  • P. Wong
  • Computer Science
    Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)
  • 1998
TLDR
A public key watermarking algorithm for image integrity verification that uses a public key as in public key cryptography, and hence it can be performed by any person without the secure exchange of a secret key.
Image watermarking for tamper detection
  • J. Fridrich
  • Computer Science
    Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269)
  • 1998
TLDR
An oblivious watermarking technique for tamper detection in digital images that enables us to distinguish malicious changes, such as replacing/adding features from nonmalicious changes resulting from common image processing operations.
Verification watermarks on fingerprint recognition and retrieval
TLDR
It is believed that watermarking of images will provided value-added protection, as well as copyright notification capability, to the fingerprint data collection processes and subsequent usage.
Effective and ineffective digital watermarks
TLDR
A number of proposed image-watermarking application scenarios are described and form a small number of watermark-application categories, and the desired technical properties of watermarks for each category are discussed.
Perceptual watermarks for digital images and video
TLDR
Digital image watermarking techniques known as perceptually watermarks that are designed to exploit aspects of the human visual system in order to produce a transparent, yet robust watermark are described.
A digital watermark
The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such
...
1
2
3
...