A REVIEW ON METHODS FOR IMAGE AUTHENTICATION AND VISUAL CRYPTOGRAPHY IN DIGITAL IMAGE WATERMARKING

被引:0
|
作者
Vyas, Chinmay [1 ]
Lunagaria, Munindra [1 ]
机构
[1] Marwadi Educ Fdn Rajkot, Fac PG Studies & Res Engn & Technol, Dept Comp Engn, Rajkot, Gujarat, India
关键词
Watermarking; visual cryptography; sensitive images; tampering; image authentication; TAMPER LOCALIZATION; SCHEME; RECOVERY;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The paper covers brief study about some of the latest research trends in digital image watermarking. The sensitive images are the images that generally carries high amount of information or very sensitive information. Since the use of sensitive images for information exchange is increasing, watermarking for these images is growing area of research. Use of Visual Cryptography in Digital Image Watermarking is also a research trend since it provides various benefits while dealing with sensitive images. The sensitive images might be victim of tampering during the transmission. Detection of any kind of tampering which is referred as image authentication is highly required for these images. Here, we have studied about some of the latest tamper detection and recovery approaches as well as some of the watermarking approaches with Visual Cryptography mechanism.
引用
收藏
页码:1191 / 1196
页数:6
相关论文
共 50 条
  • [1] Digital Image Watermarking Scheme Based on Visual Cryptography and SVD
    Mallick, Ajay Kumar
    Priyanka
    Maheshkar, Sushila
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015, 2016, 404 : 589 - 598
  • [2] Robust digital watermarking for image authentication
    Lou, Der-Chyuan
    Yin, Te-Lung
    [J]. Chung Cheng Ling Hsueh Pao/Journal of Chung Cheng Institute of Technology, 2001, 30 (01): : 13 - 25
  • [3] Digital watermarking for image authentication with localization
    Liu, Huajian
    Steinebach, Martin
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 1973 - +
  • [4] Digital watermarking scheme for image authentication
    Priya, Lakshmi C., V
    Raj, Nelwin N. R.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 2026 - 2030
  • [5] Repeating image watermarking technique by the visual cryptography
    Wang, CC
    Tai, SC
    Yu, CS
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (08) : 1589 - 1598
  • [6] Identification and authentication using visual cryptography based fingerprint watermarking over natural image
    Jaishri Chourasia
    [J]. CSI Transactions on ICT, 2013, 1 (4) : 343 - 348
  • [7] Digital Image Authentication System Based on Digital Watermarking
    Bhargava, Neeraj
    Sharma, M. M.
    Garhwal, Abhimanyu Singh
    Mathuria, Manish
    [J]. 2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 185 - 189
  • [8] Digital Watermarking with Copyright Authentication for Image Communication
    Raval, Keta
    Zafar, Sameena
    [J]. 2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, : 111 - 116
  • [9] An Image Authentication Technology Based on Digital Watermarking
    Zhu, Yong
    Yu, Xiaohong
    Liu, Xiaohuan
    [J]. 2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 179 - 183
  • [10] A Digital Watermarking Algorithm for Binary Image Authentication
    Zhang, Wenli
    Li, Zhaohong
    Ma, Jingjing
    [J]. PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 94 - 97