CFP last date
20 December 2024
Reseach Article

A Simple Approach on Image Authentication Watermarking

by Dharamvir
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 11
Year of Publication: 2013
Authors: Dharamvir
10.5120/11439-6851

Dharamvir . A Simple Approach on Image Authentication Watermarking. International Journal of Computer Applications. 67, 11 ( April 2013), 19-22. DOI=10.5120/11439-6851

@article{ 10.5120/11439-6851,
author = { Dharamvir },
title = { A Simple Approach on Image Authentication Watermarking },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 11 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 19-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number11/11439-6851/ },
doi = { 10.5120/11439-6851 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:24:23.213322+05:30
%A Dharamvir
%T A Simple Approach on Image Authentication Watermarking
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 11
%P 19-22
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An ideal watermarking scheme is a technique of embedding secret information into the image in order toauthenticate the image. This helps in detecting The integrity of the image. Here a block based Watermarking technique has been sed. A Fuzzy C means based algorithm is used here to Watermark and authenticate the image Experimental result here show that it can detect maximum modification and it can remove such changes done to the image.

References
  1. Wei-Che Chen, Ming-Shi Wang, "A fuzzy c-means clustering-based fragile watermarking scheme for image authentication", ScienceDirect, Experts System with Applications (2008) .
  2. Liyan Zhang (2001), " Comparison of Fuzzy c-means Algorithm and New Fuzzy Clustering and Fuzzy Merging Algorithm ".
  3. Bhattacharjee, S. , & Kutter, M. (1998). "Compression tolerant image authentication". In Proceedings of IEEE international conference on image processing (pp. 435–439).
  4. Celik, M. U. , Sharma, G. , Saber, E. , & Tekalp, A. M. (2000). "Hierarchical watermarking for secure image authentication with localization". IEEE Transactions on Image Processing, 11(6), 585–595.
  5. Chang, C. C. , Hu, Y. S. , & Lu, T. C. (2006). "A watermarking-based image ownership and tampering authentication scheme". Pattern Recognition Letters, 27(5), 439–446.
  6. Eggers, J. J. , & Girod, B. (2001). "Blind watermarking applied to image authentication". In Proceedings of IEEE international conference on acoustics, speech and signal processing (pp. 1977–1980).
  7. Fridrich, J. , Goljan, M. , & Baldoza, A. C. (2000). "New fragile authentication watermark for images". In Proceedings of IEEE international conference on image processing (pp. 446–449).
  8. Holliman, M. , & Memon, N. (2000). "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes". IEEE Transactions on Image Processing, 9(3), 432–441.
  9. Kundur, D. , & Hatzinakos, D. (1999), "Digital watermarking for telltale tamper proofing and authentication". In Proceedings of the IEEE special issue on identification and protection of multimedia information (pp. 1167–1180).
  10. Li, C. -T. , & Yuan, Y. (2006). "Digital watermarking scheme exploiting nondeterministic dependence for image authentication". Optical Engineering, 45(12), 127001.
  11. Lin, C. Y. , & Chang, S. F. (2000). "Semi-fragile watermarking for authenticating JPEG visual content". In Proceedings of SPIE conference on security and watermarking of multimedia contents II (pp. 140–151).
  12. Lin, E. T. , Podilchuk, C. I. , & Delp, E. J. (2000). "Detection of image alterations using semi-fragile watermarks". In Proceedings of SPIE conference on security and watermarking of multimedia contents II (pp. 152–163).
  13. Lin, P. -L. , Hsieh, C. -K. , & Huang, P. -W. (2005). "A hierarchical digital watermarking method for image tamper detection and recovery". Pattern Recognition, 38(12), 2519–2529.
  14. Lu, C. -S. , & Liao, H. -Y. (2001). "Multipurpose watermarking for image authentication and protection". IEEE Transactions on Image Processing, 10(10), 1579–1592.
  15. Sachin Goyal, Roopam Gupta, Ashish Bansal, (2010) "A survey of digital watermarking with Genetic Algorithms". CSI Communications Journal, Volume No. 33.
Index Terms

Computer Science
Information Sciences

Keywords

Image authentication detection watermarking