Fragile watermarking scheme for accepting image compression

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As images are commonly transmitted or stored in compressed form such as JPEG lossy compression, image authentication demands techniques that can distinguish incidental modifications (e.g., compression) from malicious ones. In this paper, we propose an effective technique for image authentication which can prevent malicious manipulations but allow JPEG compression. An image is divided into blocks in the spatial domain, each block is divided into two parts by randomly selecting pixels, and average gray values for the parts are calculated. The average value is compared with that of the adjoining block to obtain an authentication signature. The extracted authentication information becomes the fragile watermark to be inserted into the image's frequency domain DCT block. The experimental results show that this is an effective technique of image authentication. © IFIP International Federation for Information Processing 2005.

Cite

CITATION STYLE

APA

Kim, M. A., Yoo, K. S., & Lee, W. H. (2005). Fragile watermarking scheme for accepting image compression. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3824 LNCS, pp. 940–946). Springer Verlag. https://doi.org/10.1007/11596356_93

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free