9
Views
11
CrossRef citations to date
0
Altmetric
Articles

Fragile watermarking scheme for digital image authentication using pixel difference

Pages 140-147 | Published online: 18 Jul 2013

References

  • Rivest, R., Shamir, A. and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 1978, 21, 120–126.
  • Lin, C. Y. and Chang, S. F. A robust image authentication method distinguish JPEG compression from malious manuipulation. IEEE Trans. Circ. Syst. Video Technol., 2001, 11, 153–168.
  • Lin, C. H. and Hsieh, W. S. Applying projection and B-spline to image authentication and remedy. IEEE Trans. Consumer Electron., 2003, 49, 1234–1239.
  • Wu, C. W. On the design of content-based multimedia authentication systems. IEEE Trans. Multimedia, 2002, 4, 385–393.
  • Xie, L., Arce, G. R. and Gravman, R. F. Approximate image message authentication codes. IEEE Trans. Multimedia, 2001, 3, 242–252.
  • Wong, P. W. A public key watermark for image verification and authentication. Proc. IEEE Int. Conf. Image Processing, Chicago, 1998, Vol. 1 (IEEE, Piscataway, NJ ), pp. 455–459.
  • Wong, P. W. and Memon, N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process., 2001, 10, 1593–1601.
  • Celik, M. U., Sharma, G., Saber, E., and Tekalp, A. M. Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process., 2002, 11, 585–595.
  • Garg, G., Sharma, P. K. and Chaudhury, S. Image based document authentication using DCT. Pattern Recognition Lett., 2001, 22, 725–729.
  • Kundur, D. and Hatzinakos, D. Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE, 1999, 87, 1167–1180.
  • Lu, C. S. and Liao, H. Y. Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimedia, 2003, 5, 161–173.
  • Queluz, M. P. Authentication of digital images and video: Generic models and a new contribution. Signal Process. Image Commun., 2001, 16, 461–475.
  • Tsai, P., Hu, Y. C. and Chang, C. C. Using set partitioning in hierarchical trees to authenticate digital images. Signal Process. Image Commun., 2003, 18, 813–822.
  • Tzeng, C. H. and Tsai, W. H. A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Commun. Lett., 2003, 7, 443–445.
  • Wu, M. and Liu, B. Data hiding in binary image for authentication and annotation. IEEE Trans. Multimedia, 2004, 6, 528–538.
  • Wu, D. C. and Tsai, W. H. Spatial-domain image hiding using an image differencing. IEE Proc. Vision Image Signal Process., 2000, 147, 29–37.
  • Wu, D. C. and Tsai, W. H. A steganographic method for images by pixel-value differencing. Pattern Recognition Lett., 2003, 24, 1613–1626.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.