Chaotic watermarking scheme for authentication of JPEG Images

@article{Wang2008ChaoticWS,
  title={Chaotic watermarking scheme for authentication of JPEG Images},
  author={Hongxia Wang and Ke Ding and Changxing Liao},
  journal={2008 International Symposium on Biometrics and Security Technologies},
  year={2008},
  pages={1-4}
}
-With developing of computer networks and digital techniques, the electronic image are easily created, edited, reproduced and distributed. Unfortunately, illegal copy and malicious tamper are also facilitated. At present, fragile watermark is researched greatly to authenticate the veracity and integrity of electronic contents. In this paper, a chaotic watermarking scheme for authentication of popular JPEG images is proposed. The quantized DCT ( Discrete Cosine Transform ) coefficients after… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 15 CITATIONS

A Survey Of Digital Watermarking Techniques

VIEW 3 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

An effective content-based copy detection scheme for image authentication

  • 2014 International Conference on Machine Learning and Cybernetics
  • 2014
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-8 OF 8 REFERENCES

Quickly tracing detection for spread spectrum watermark based on the invariant moments

G. R. Feng, L. G. Jiang, D. J. Wang
  • Pattern Recognition, vol.35, no.12, pp. 2530-2536, December 2005.
  • 2005

Semi-fragile watermarking scheme for authentication of JPEG images

  • International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.
  • 2004
VIEW 1 EXCERPT