WATERMARKING AUTHENTICATION:USING THE FRAGILE MODE OR THE ROBUST MODE?

被引:0
|
作者
Chen Dan Wu Qianhong Wang Yumin State Key Lab on ISN Xidian University Xian China [710071 ]
机构
关键词
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Due to the lack of a unified authentication model certain mistakes occurred in the use of the wa-termarking authentication methods. To clarify the confusion, authentication models of robust and fragile wa-termarking are developed respectively in the paper. Concrete algorithms are proposed to prove the models that different Discrete Wavelet Transform (DWT) domains are utilized to embed the watermarks and quanti-zation method is presented with Just Notice Differences (JNDs) threshold as the quantization size. After the key technologies about the two methods are discussed, we detail the comparison of the two modes and rec-ommend their respective application scenarios as applicable results.
引用
收藏
页码:549 / 553
页数:5
相关论文
共 50 条
  • [31] HIERARCHICAL FRAGILE WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Lin, Shinfeng D.
    Yang, Zong-Lin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 245 - 255
  • [32] A dual fragile watermarking scheme for speech authentication
    Qian, Qing
    Wang, Hong-Xia
    Hu, Yi
    Zhou, Lin-Na
    Li, Jin-Feng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13431 - 13450
  • [33] Fragile watermarking schemes for image authentication: a survey
    K. Sreenivas
    V. Kamkshi Prasad
    International Journal of Machine Learning and Cybernetics, 2018, 9 : 1193 - 1218
  • [34] A new fragile watermarking technique for image authentication
    Zhong, H
    Liu, F
    Jiao, LC
    2002 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I AND II, 2002, : 792 - 795
  • [35] A chaotic fragile watermarking algorithm for image authentication
    Zhu, Congxu
    Huang, Dazu
    Hu, Yuping
    2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2007, : 829 - 833
  • [36] A secure fragile watermarking scheme for image authentication
    He, Hongjie
    Zhang, Jiashu
    Tai, Heng-Ming
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1180 - 1185
  • [37] ROBUST VIDEO FACIAL AUTHENTICATION WITH UNSUPERVISED MODE DISENTANGLEMENT
    Kim, Minsu
    Lee, Hong Joo
    Lee, Sangmin
    Ro, Yong Man
    2020 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2020, : 1321 - 1325
  • [38] Fragile and robust watermarking by histogram specification
    Coltuc, D
    Bolon, P
    Chassery, JM
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 701 - 710
  • [39] Robust Audio Watermarking Algorithm Based on Empirical Mode Decomposition
    Tang Xin
    Ma Zhaofeng
    Niu Xinxin
    Yang Yixian
    CHINESE JOURNAL OF ELECTRONICS, 2016, 25 (06) : 1005 - 1010
  • [40] Robust Audio Watermarking Algorithm Based on Empirical Mode Decomposition
    TANG Xin
    MA Zhaofeng
    NIU Xinxin
    YANG Yixian
    Chinese Journal of Electronics, 2016, 25 (06) : 1005 - 1010