Security on Fragile and Semi-fragile Watermarks Authentication

@article{Saha2010SecurityOF,
  title={Security on Fragile and Semi-fragile Watermarks Authentication},
  author={Shilpi Saha and Debnath Bhattacharyya and Samir Kumar Bandyopadhyay},
  journal={International Journal of Computer Applications},
  year={2010},
  volume={3},
  pages={23-27}
}
ABSTRACT Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Ensuring digital image security has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of some possible attacks which may cause harm the present watermarking techniques. Here we have identified… 
Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique
  • S. Hosseini, M. Mahdavi
  • Computer Science
    2016 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)
  • 2016
TLDR
This paper presents a counterfeiting attack and demonstrates that the semi-fragile watermarking method is not even fragile against complete counterfeiting, making it incapable of detecting image tampering.
Digital watermarking for image using FELICS algorithm in VLSI implementation
TLDR
A new watermarking and Fast Efficient Lossless JPEG Image Compression scheme is proposed to optimize security, copyright, authentication and compression rate when watermarks are embedded into JPEG 2000 compressed images.
Digital image authentication based on second-order statistics
TLDR
A combination of MSS and a feature extraction technique called second-order feature statistic to build an authentication scheme which produces a high quality image and protects the image integrity.
Hardware Implementation of a Digital Watermarking System for Video Authentication
TLDR
Experimental results show that a hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and segment removal on video sequences.
A Feature-Based Semi-fragile Watermarking Algorithm for Digital Color Image Authentication Using Hybrid Transform
TLDR
Experimental results prove that, proposed semi-fragile watermarking technique using feature extraction is robust against group of attacks with adequate hiding capacity and imperceptibility as compare to existing systems.
MEDICAL IMAGES WATERMARKING SCHEMES-A REVIEW
TLDR
A review of recent watermarking techniques of medical images and a comparison between various types of transform domains and the different purposes ofmedical images’ watermark are presented.
Hardware Implementation of a Digital Watermarking System Using 3d Dct
TLDR
This thesis presents a secure, low power and low hardware video watermarking system that inserts an invisible semi-fragile watermark into the video stream for real-time surveillance video authentication during the commonly used MPEG-4 encoding process with insignificant video quality degradation.
Digital Watermarking : Potential Challenges and Issues
In the era of technology, Editing, manipulation, copying of digital multimedia has become prevalent and becoming a serious issue in the present scenario. Digital watermarking is one of the solution
FPGA Implementation of 3 D DCT in Semifragile Watermarking System for Video Authentication
This paper presents a hardware implementation of a digital watermarking system that can insert invisible, semifragile watermark information into compressed video streams in real time. The watermark
Hardware implementation for sending concealed data in video by using wavelets
TLDR
Experimental results show that a hardware-based video authentication system using this watermarking technique features minimum video quality degradation and can withstand certain potential attacks, i.e., cover-up attacks, cropping, and segment removal on video sequences.
...
1
2
...

References

SHOWING 1-8 OF 8 REFERENCES
A Survey of Watermarking Algorithms for Image Authentication
TLDR
The notion of image content authentication and the features required to design an effective authentication scheme are introduced, and some algorithms are presented, and frequently used key techniques are introduced.
Blind detection of malicious alterations on still images using robust watermarks
TLDR
An original method to protect image authenticity using an invisible and robust watermark that is independent of the signer, however the latter must have a high capacity and be able to extract the watermark in full blind detection mode.
An invisible watermarking technique for image verification
  • M. Yeung, F. Mintzer
  • Computer Science
    Proceedings of International Conference on Image Processing
  • 1997
We propose a new method for invisibly watermarking high-quality color and gray-scale images. This method is intended for use in image verification applications, where one is interested in knowing
A Watermark for Image Integrity and Ownership Verification
TLDR
The invisible authentication watermark inherits the security of a cryptographic hash fun tion, hence it is computationally infeasible for any user to confuse the image integrity or owners by forgery.
A digital watermark
The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such
A watermark for digital images
TLDR
This work describes two techniques for the invisible marking of images and analyzes the robustness of the watermarks with respect to linear and nonlinear filtering, and JPEG compression.
Digital communications
  • J. Mazo
  • Computer Science
    Proceedings of the IEEE
  • 1985
TLDR
This month's guest columnist, Steve Bible, N7HPR, is completing a master’s degree in computer science at the Naval Postgraduate School in Monterey, California, and his research area closely follows his interest in amateur radio.
Digital watermarking: A tutorial review
  • http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1 3.4913&rep=rep1&type=pdf
  • 2010