We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Article:Security on Fragile and Semi-fragile Watermarks Authentication

by Shilpi Saha, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 4
Year of Publication: 2010
Authors: Shilpi Saha, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay
10.5120/721-1013

Shilpi Saha, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay . Article:Security on Fragile and Semi-fragile Watermarks Authentication. International Journal of Computer Applications. 3, 4 ( June 2010), 23-27. DOI=10.5120/721-1013

@article{ 10.5120/721-1013,
author = { Shilpi Saha, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay },
title = { Article:Security on Fragile and Semi-fragile Watermarks Authentication },
journal = { International Journal of Computer Applications },
issue_date = { June 2010 },
volume = { 3 },
number = { 4 },
month = { June },
year = { 2010 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume3/number4/721-1013/ },
doi = { 10.5120/721-1013 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:51:02.573248+05:30
%A Shilpi Saha
%A Debnath Bhattacharyya
%A Samir Kumar Bandyopadhyay
%T Article:Security on Fragile and Semi-fragile Watermarks Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 3
%N 4
%P 23-27
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Ensuring digital image security has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of some possible attacks which may cause harm the present watermarking techniques. Here we have identified the attacks which frequently attacks some very well known fragile and semifragile watermarking techniques..

References
Index Terms

Computer Science
Information Sciences

Keywords

Attack image authentication watermark fragile semi-fragile security private key public key