WATERMARKING AUTHENTICATION:USING THE FRAGILE MODE OR THE ROBUST MODE?

被引:0
|
作者
Chen Dan Wu Qianhong Wang Yumin State Key Lab on ISN Xidian University Xian China [710071 ]
机构
关键词
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking are developed respectively in the paper. Concrete algorithms are proposed to prove the models that different Discrete Wavelet Transform (DWT) domains are utilized to embed the watermarks and quanti-zation method is presented with Just Notice Differences (JNDs) threshold as the quantization size. After the key technologies about the two methods are discussed, we detail the comparison of the two modes and rec-ommend their respective application scenarios as applicable results.
引用
收藏
页码:549 / 553
页数:5
相关论文
共 50 条
  • [21] Toral fragile watermarking for image authentication with localization
    Yeh, FH
    Lee, GC
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, 2004, : 47 - 52
  • [22] Oblivious fragile watermarking scheme for image authentication
    Li, CT
    Yang, FM
    Lee, CS
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3445 - 3448
  • [23] A FRAGILE SOFTWARE WATERMARKING ALGORITHM FOR CONTENT AUTHENTICATION
    Zhu, Jianpeng
    Wei, Qing
    Xiao, Jun
    Wang, Ying
    2009 IEEE YOUTH CONFERENCE ON INFORMATION, COMPUTING AND TELECOMMUNICATION, PROCEEDINGS, 2009, : 391 - +
  • [24] Content-fragile watermarking for image authentication
    Dittmann, J
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 175 - 184
  • [25] Fragile watermarking schemes for image authentication: a survey
    Sreenivas, K.
    Kamkshi Prasad, V.
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2018, 9 (07) : 1193 - 1218
  • [26] A dual fragile watermarking scheme for speech authentication
    Qing Qian
    Hong-Xia Wang
    Yi Hu
    Lin-Na Zhou
    Jin-Feng Li
    Multimedia Tools and Applications, 2016, 75 : 13431 - 13450
  • [27] Region of interest fragile watermarking for image authentication
    Chu, Yiping
    Zhang, Yin
    Zhang, Sanyuan
    Ye, Xiuzi
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 1, 2006, : 726 - +
  • [28] A Fragile Watermarking Scheme for Color Image Authentication
    Hassan, M. Hamad
    Gilani, S. A. M.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 312 - 316
  • [29] New Semi-Fragile Authentication Watermarking
    孙鑫
    易开祥
    费敏锐
    Journal of Shanghai University, 2002, (02) : 158 - 162
  • [30] New semi-fragile authentication watermarking
    Shi, JY
    Yi, KX
    ADVANCES IN MUTLIMEDIA INFORMATION PROCESSING - PCM 2001, PROCEEDINGS, 2001, 2195 : 969 - 974