Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Fragile watermarking scheme for accepting image compression

Authors
Kim, M.-A.Yoo, K.-S.Lee, W.-H.
Issue Date
Dec-2005
Publisher
SPRINGER-VERLAG BERLIN
Citation
EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005, v.3824, pp 940 - 946
Pages
7
Journal Title
EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005
Volume
3824
Start Page
940
End Page
946
URI
https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/53234
DOI
10.1007/11596356_93
ISSN
0302-9743
1611-3349
Abstract
As images are commonly transmitted or stored in compressed form such as JPEG lossy compression, image authentication demands techniques that can distinguish incidental modifications (e.g., compression) from malicious ones. In this paper, we propose an effective technique for image authentication which can prevent malicious manipulations but allow JPEG compression. An image is divided into blocks in the spatial domain, each block is divided into two parts by randomly selecting pixels, and average gray values for the parts are calculated. The average value is compared with that of the adjoining block to obtain an authentication signature. The extracted authentication information becomes the fragile watermark to be inserted into the image's frequency domain DCT block. The experimental results show that this is an effective technique of image authentication.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School of Advanced Imaging Sciences, Multimedia and Film > Department of Imaging Science and Arts > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE