WATERMARKING AUTHENTICATION:USING THE FRAGILE MODE OR THE ROBUST MODE?

被引:0
|
作者
Chen Dan Wu Qianhong Wang Yumin State Key Lab on ISN Xidian University Xian China [710071 ]
机构
关键词
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking are developed respectively in the paper. Concrete algorithms are proposed to prove the models that different Discrete Wavelet Transform (DWT) domains are utilized to embed the watermarks and quanti-zation method is presented with Just Notice Differences (JNDs) threshold as the quantization size. After the key technologies about the two methods are discussed, we detail the comparison of the two modes and rec-ommend their respective application scenarios as applicable results.
引用
收藏
页码:549 / 553
页数:5
相关论文
共 50 条
  • [1] WATERMARKING AUTHENTICATION:USING THE FRAGILE MODE OR THE ROBUST MODE?
    Chen Dan Wu Qianhong Wang Yumin (State Key Lab on ISN
    Journal of Electronics(China), 2006, (04) : 549 - 553
  • [2] Invertible chaotic fragile watermarking for robust image authentication
    Sidiropoulos, Panagiotis
    Nikolaidis, Nikos
    Pitas, Ioannis
    CHAOS SOLITONS & FRACTALS, 2009, 42 (05) : 2667 - 2674
  • [3] Fragile watermarking for image authentication using BRINT and ELM
    AlShehri, Laila
    Hussain, Muhammad
    Aboalsamh, Hatim
    Wadood, Abdul
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (39-40) : 29199 - 29223
  • [4] Fragile watermarking for image authentication using BRINT and ELM
    Laila AlShehri
    Muhammad Hussain
    Hatim Aboalsamh
    Abdul Wadood
    Multimedia Tools and Applications, 2020, 79 : 29199 - 29223
  • [5] A ROBUST DIGITAL AUDIO WATERMARKING ALGORITHM USING EMPIRICAL MODE DECOMPOSITION
    Zaman, A. N. K.
    Khalilullah, K. M. Ibrahim
    Islam, Md. Wahedul
    Molla, Md. Khademul Islam
    2010 23RD CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2010,
  • [6] Fragile logo watermarking for public authentication
    Bravo, Sergio
    Gan, Lu
    Nandi, Asoke K.
    Aburdene, Maurice F.
    2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1669 - +
  • [7] Scalable fragile watermarking for image authentication
    Piper, Angela
    Safavi-Naini, Reihaneh
    IET INFORMATION SECURITY, 2013, 7 (04) : 300 - 311
  • [8] A Fragile Watermarking Scheme for Image Authentication Using Wavelet Transform
    Azeroual, Assma
    Afdel, Karim
    IMAGE AND SIGNAL PROCESSING (ICISP 2016), 2016, 9680 : 337 - 345
  • [9] A Fragile Watermarking Algorithm for Hologram Authentication
    Cheng, Chau-Jern
    Hwang, Wen-Jyi
    Zeng, Han-Yi
    Lin, Yu-Chih
    JOURNAL OF DISPLAY TECHNOLOGY, 2014, 10 (04): : 263 - 271
  • [10] Fragile watermarking scheme for image authentication
    Lu, HT
    Shen, RM
    Chung, FL
    ELECTRONICS LETTERS, 2003, 39 (12) : 898 - 900