Hamming Code-Based Watermarking Scheme for Image Authentication and Tampered Detection

Author(s):  
Pabitra Pal ◽  
Partha Chowdhuri ◽  
Biswapati Jana ◽  
Jaydeb Bhaumik
Author(s):  
Sung-Cheal Byun ◽  
Sang-Kwang Lee ◽  
Ahmed H. Tewfik ◽  
Byung-Ha Ahn

Author(s):  
Latha Parameswaran ◽  
K Anbumani

This chapter discusses a content-based authentication technique based on inter-coefficient relationship of Discrete Wavelet Transform (DWT). Watermark is generated from the first level DWT. An image digest (which is a binary string) is generated from the second level DWT. The watermark is embedded in the mid-frequency coefficients of first level DWT as directed by the image digest. Image authentication is done by computing the Completeness of Signature. The proposed scheme is capable of withstanding incidental image processing operations such as compression and identifies any malicious tampering done on the host image.


2006 ◽  
Vol 54 (3) ◽  
pp. 129-133 ◽  
Author(s):  
K-C Liaoa ◽  
W-B Leea ◽  
C-W Liaob

Sign in / Sign up

Export Citation Format

Share Document