Secret and public key image watermarking schemes for image authentication and ownership verification

@article{Wong2001SecretAP,
  title={Secret and public key image watermarking schemes for image authentication and ownership verification},
  author={Ping Wah Wong and Nasir D. Memon},
  journal={IEEE transactions on image processing : a publication of the IEEE Signal Processing Society},
  year={2001},
  volume={10 10},
  pages={1593-601}
}
We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark, indicating the image is authentic and has not been changed since the insertion of… CONTINUE READING
Highly Influential
This paper has highly influenced 34 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 663 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 339 extracted citations

Quantization-based image authentication scheme using QR error correction

EURASIP J. Image and Video Processing • 2017
View 5 Excerpts
Highly Influenced

Recover the tampered image based on VQ indexing

Signal Processing • 2010
View 7 Excerpts
Highly Influenced

Fragile logo watermarking for public authentication

2008 IEEE International Conference on Acoustics, Speech and Signal Processing • 2008
View 7 Excerpts
Highly Influenced

A Design of Secure Watermarking Scheme for Images in Spatial Domain

2006 Annual IEEE India Conference • 2006
View 4 Excerpts
Highly Influenced

A Secure Fragile Watermarking Scheme for Image Authentication

2006 International Conference on Computational Intelligence and Security • 2006
View 6 Excerpts
Highly Influenced

A method for image recovery in the DFT domain

CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006. • 2006
View 8 Excerpts
Highly Influenced

An Adaptive Method for Image Recovery in the DFT Domain

Journal of Multimedia • 2006
View 7 Excerpts
Highly Influenced

664 Citations

0204060'01'04'08'12'16
Citations per Year
Semantic Scholar estimates that this publication has 664 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 17 references

The MD5 Message-Digest Algorithm

RFC • 1992
View 6 Excerpts
Highly Influenced

Color correct digital watermarking of images

G. W. Braudaway, K. A. Magerlein, F. C. Mintzer
U.S. Patent 5 530 759, June 1996. • 1996
View 3 Excerpts
Highly Influenced

Issues and solutions for authenticating MPEG video

Security and Watermarking of Multimedia Contents • 1999
View 1 Excerpt

Robust Image Authentication Method Surviving JPEG Lossy Compression

Storage and Retrieval for Image and Video Databases • 1998
View 1 Excerpt

Similar Papers

Loading similar papers…