tamper location
Recently Published Documents


TOTAL DOCUMENTS

5
(FIVE YEARS 1)

H-INDEX

2
(FIVE YEARS 0)

The image is significantly used in applications such as medical area, research area, image conferencing, a military image system, online transactions, digital signatures, passwords etc. But not everyone who uses this network is going to play by the rules or have the best interest at heart. Just as we have physical security like locks, fences and police officers to minimize crime in the real world. We need some security to minimize crime and harm in the virtual world. Three important factors form the security objectives of the digital content: they are Availability, Confidentiality, and Integrity. Watermarking techniques along with some Cryptography are used to protect the confidentiality of data. Watermarking is basically a process of injecting data into an image in such a way that it can depict the authenticity of those possessing it. The digital information hidden inside an image is imperceptible to the user but can be easily detected by a computer or various digital devices. Watermarking Technique has proved to be a powerful technique for image security and a lot of research has been made over the years to how to embed the watermarks and recover the watermarks effectively. These types of technique where watermark can be fully extracted from the image and along with the restoration of the cover are popularly known as Reversible Watermarking techniques. These techniques have significantly gained importance due to this excellent recovering property making them suitable for content authentication based applications. However, they are not able to identify any modifications or changes done in watermark making it susceptible to tamper location-based attacks. Due to the rapid development of watermarking techniques, a concluding review of recent research in this field is highly desirable. However, the major focus of this paper is on tamper localization based reversible watermarking techniques.


2015 ◽  
Vol 7 (3) ◽  
pp. 19-36 ◽  
Author(s):  
Fan Zhang ◽  
Zhenghui Liu ◽  
Hongxia Wang

Watermark schemes content-based provide one way to solve the veracity and integrity of speech content. Some existed content-based schemes are vulnerable to feature-analysed substitution attack. Aiming to solve the problems, a secure speech content authentication algorithm is proposed, on the basic of the undeterminate angle of discrete fractional fourier transform. In the paper, the definition and calculation of discrete fractional fourier transform are given. And the watermark generation method based on discrete fractional fourier transform is analyzed. Frame number and watermark bits are embedded into hybrid domain of scrambled signals. Compared with the existed watermark schemes, the features for watermark generation and embedding are secret, which improves the security of watermark system. Theoretical analysis and experimental evaluation results show that the proposed algorithm is inaudible, robust to desynchronous attacks and has the excellent ability of tamper detection and tamper location.


Author(s):  
Li Weng ◽  
Geert Braeckman ◽  
Ann Dooms ◽  
Bart Preneel ◽  
Peter Schelkens

Sign in / Sign up

Export Citation Format

Share Document