fragile watermark
Recently Published Documents


TOTAL DOCUMENTS

58
(FIVE YEARS 6)

H-INDEX

8
(FIVE YEARS 1)

2021 ◽  
Vol 9 (1) ◽  
pp. 1374-1378
Author(s):  
Lakshman Ji, Dr Shiv Kumar

Digital watermarking is the effective method of copyright defence. Typically robot-proof watermarks used to secure copyright, and are immune to some deletion or adjustment of protected documents. Fragile watermarks are typically used for content identification and are vulnerable to small alterations. In this paper, we suggest a hybrid watermarking approach that combines a solid and fragile watermark with copyright and material authentication. This mechanism is often resistant to manipulation and to clone attacks at the same time. The relationship between a delicate watermark and a stable watermark is characterised by our involvement. DCT coefficients are used to integrate the values of the watermark.


2020 ◽  
Vol 79 (25-26) ◽  
pp. 18071-18088 ◽  
Author(s):  
Xinhui Gong ◽  
Lei Chen ◽  
Feng Yu ◽  
Xiaohong Zhao ◽  
Shihong Wang

2019 ◽  
Vol 9 (15) ◽  
pp. 3020 ◽  
Author(s):  
Xie ◽  
Wang ◽  
Li

Many fragile watermark methods have been proposed for image recovery and their performance has been greatly improved. However, jagged edges and confusion still exist in the restored areas and these problems need to be solved to achieve a better visual effect. In this paper, a method for improving recovery quality is proposed that adopts singular value decomposition (SVD) and edge detection for tamper detection and then uses a median filter for image recovery. Variable watermark information can be generated that corresponds to block classifications. With mapping and neighborhood adjustment, the area that has been tampered can be correctly detected. Subsequently, we adopt a filtering operation for the restored image obtained after the inverse watermark embedding process. During the filtering operation, a median filter is used to smooth and remove noise, followed by minimum, maximum and threshold operations to balance the image intensity. Finally, the corresponding pixels of the restored image are replaced with the filtered results. The experimental results of six different tampering attacks conducted on eight test images show that tamper detection method with the edge detection can identify the tampered region correctly but has a higher false alarm rate than other methods. In addition, compared with the other three similar methods previously, using a median filter during image recovery not only improves the visual effect of the restored image but also enhances its quality objectively under most tampering attack conditions.


Author(s):  
M. N. Favorskaya ◽  
E. I. Savchina

<p><strong>Abstract.</strong> At present, medical equipment provides often 3D models of scanning organs instead of ordinary 2D images. This concept is supported by Digital Imaging and COmmunications in Medicine (DICOM) standard available for telemedicine. This means that the confidential information under transmission ought to be protected by special techniques, particularly digital watermarking scheme instead of textual informative files represented, for example, on CD disks. We propose a multilevel protection, for which a fragile watermark is the first level of protection. The Region Of Interest (ROI) watermark and textual watermarks with information about patient and study (the last ones can be combines as a single textual watermark) form the second level of protection. Encryption of the ROI and textual watermarks using Arnold’s transform is the third level of protection. In the case of 3D models, we find the ROI in each of 2D sliced images, apply the digital wavelet transform or digital shearlet transform (depending on the volume of watermarks) for the ROI and textual watermarks embedding, and embed a fragile watermark using digital Hadamard transform. The main task is to find the relevant regions for embedding. To this and, we develop the original algorithm for selecting relevant regions. The obtained results confirm the robustness of our approach for rotation, scaling, translation, and JPEG attacks.</p>


Author(s):  
Shivendra Shivani ◽  
Suneeta Agarwal ◽  
Jasjit S. Suri

Author(s):  
Shivendra Shivani ◽  
Suneeta Agarwal ◽  
Jasjit S. Suri

2018 ◽  
Vol 73 ◽  
pp. 83-92 ◽  
Author(s):  
Sergio Bravo-Solorio ◽  
Felix Calderon ◽  
Chang-Tsun Li ◽  
Asoke K. Nandi

Sign in / Sign up

Export Citation Format

Share Document