content authentication
Recently Published Documents


TOTAL DOCUMENTS

193
(FIVE YEARS 37)

H-INDEX

16
(FIVE YEARS 3)

2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Qiang Ma ◽  
Ling Xing

AbstractPerceptual video hashing represents video perceptual content by compact hash. The binary hash is sensitive to content distortion manipulations, but robust to perceptual content preserving operations. Currently, boundary between sensitivity and robustness is often ambiguous and it is decided by an empirically defined threshold. This may result in large false positive rates when received video is to be judged similar or dissimilar in some circumstances, e.g., video content authentication. In this paper, we propose a novel perceptual hashing method for video content authentication based on maximized robustness. The developed idea of maximized robustness means that robustness is maximized on condition that security requirement of hash is first met. We formulate the video hashing as a constrained optimization problem, in which coefficients of features offset and robustness are to be learned. Then we adopt a stochastic optimization method to solve the optimization. Experimental results show that the proposed hashing is quite suitable for video content authentication in terms of security and robustness.


Author(s):  
Namita Agarwal ◽  
Pradeep Kumar Singh

Sharing of digital media over internet is becoming easier due to content authentication and security provided by digital watermarking. It also locates application in other fields like copyright protection, tele-medicine, military, tamper detection, and many more. This paper represents the robust watermarking approach using Paillier homomorphic cryptosystem with Arnold transformation. In this, the watermarking system is primarily prepared at an encrypted DWT-DCT domain. Cryptosystem is exploited at this time to encrypt the original media. For more security of multimedia content, the watermark image is scrambled through Arnold scrambling technique. The embedding process is done here to produce the encrypted watermark image followed by the encryption process. At recovery phase, decryption of encrypted watermark image to get the original and watermark image is done. The experimental result has shown that watermarking method is more robust and offers the security of digital media.


2021 ◽  
Vol 129 ◽  
pp. 41-57
Author(s):  
Raphaël C.-W. Phan ◽  
Yin-Yin Low ◽  
KokSheik Wong ◽  
Kazuki Minemura

Author(s):  
Muni Sekhar Velpuru

Digital content security gained immense attention over past two decades due rapid digitization of industries and government sectors, and providing security to digital content became a vital challenge. Digital watermarking is one prominent solution to protect digital content from tamper detection and content authentication. However, digital watermarking can alter sensitive information present on cover-content during embedding, then the recovery of exact cover-content may not be possible during extraction process. Moreover, certain applications may not allow small distortions in cover-content. Hence, reversible watermarking techniques of digital content can extract cover-content and watermark completely. Additionally, reversible watermarking is gaining popularity by an increasing number of applications in military, law enforcement, healthcare. In this chapter, the authors compare and contrast the different reversible watermarking techniques with quality and embedding capacity parameters. This survey is essential due to the rapid evolution of reversible watermarking techniques.


Author(s):  
Surya Prasada Rao Borra ◽  
Kongara Ramanjaneyulu ◽  
K. Raja Rajeswari

An image watermarking method using Discrete Wavelet Transform (DWT) and Genetic Algorithm (GA) is presented for applications like content authentication and copyright protection. This method is robust to various image attacks. For watermark detection/extraction, the cover image is not essential. Gray scale images of size 512 × 512 as cover image and binary images of size 64 × 64 as watermark are used in the simulation of the proposed method. Watermark embedding is done in the DWT domain. 3rd and 2nd level detail sub-band coefficients are selected for further processing. Selected coefficients are arranged in different blocks. The size of the block and the number blocks depends on the size of the watermark. One watermark bit is embedded in each block. Then, inverse DWT operation is performed to get the required watermarked image. This watermarked image is used for transmission and distribution purposes. In case of any dispute over the ownership, the hidden watermark is decoded to solve the problem. Threshold-based method is used for watermark extraction. Control parameters are identified and optimized based on GA for targeted performance in terms of PSNR and NCC. Performance comparison is done with the existing works and substantial improvement is witnessed.


2020 ◽  
Vol 2020 ◽  
pp. 1-13 ◽  
Author(s):  
Shaozhang Xiao ◽  
Zhengwei Zhang ◽  
Yue Zhang ◽  
Changhui Yu

Considering the existing medical image watermarking algorithms, a single function often has limitations, and a multipurpose watermarking algorithm for medical images is proposed. First, medical images are divided into regions of interest (ROIs) and regions of noninterest (RONIs). Then, the authentication watermark produced for each subblock of the ROI is embedded into the corresponding mapping subblock. The visible watermark is embedded into the RONI, and, finally, the watermark information and constructed authentication information in each subblock of the ROI are embedded into the corresponding RONI subblock. Simulation results show that the embedded visible watermark can protect and facilitate medical image management. In addition, the proposed algorithm has strong robustness and very good visual quality. It can simultaneously realize copyright protection and content authentication and also has high tamper localization capability.


Sign in / Sign up

Export Citation Format

Share Document