Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 6
Page No. 1582 - 1589

A Semi-Fragile Watermarking Based Image Authentication

Authors : Suhad Ahmed Ali, Majid Jabbar Jawad and Mohammed Abdullah Naser

References

Cruz, C., J.A. Mendoza, M.N. Miyatake, H.P. Meana and B. Ndrkoski, 2009. Semi-fragile watermarking based image authentication with recovery capability. Proceeding of the 2009 International Conference on Information Engineering and Computer Science, December 19-20, 2009, IEEE, Mexico City, Mexico, ISBN:978-1-4244-4994-1, pp: 1-4.

Huynh-Thu, Q. and M. Ghanbari, 2008. Scope of validity of PSNR in image/video quality assessment. Electronics Lett., 44: 800-801.
CrossRef  |  

Kutter, M. and F.A.P. Petitcolas, 1999. A fair benchmark for image watermarking systems. Proceedings of the Security and Watermarking of Multimedia Contents, January 25-27, 1999, Society of Photo-Optical Instrumentation Engineers, Sans Jose, California, USA., pp: 226-239.

Lintao, L.V., H. Fan, W. Jinfeng and Y. Yuxiang, 2012. A semi-fragile watermarking scheme for image tamper localization and recovery. J. Theor. Appl. Inf. Technol., 42: 287-291.
Direct Link  |  

Lu, J., M. Wang, J. Dai, Q. Huang, L. Li and C.C. Chang, 2015. Multiple watermark scheme based on DWT-DCT quantization for medical images. J. Inform. Hiding Multimedia Signal Process., 6: 458-472.
Direct Link  |  

Manickam, L., S.A.K. Jilani and M.N. Prasad, 2013. A novel fragile watermarking scheme for image tamper detection using K mean clustering. Int. J. Comput. Trends Technol., 4: QA75.5-QA76.95.
Direct Link  |  

Navas, K.A., M. Sasikumar and S. Sreevidya, 2007. A benchmark for medical image watermarking. Proceedings of the 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services, June 27-30, IEEE Computer Society, Maribor, pp: 237-240.

Preda, R.O., I. Marcu and A. Ciobanu, 2015. Image authentication and recovery using wavelet-based dual watermarking. U.P.B. Sci. Bull. Ser. C., 77: 200-212.
Direct Link  |  

Qi, X., X. Xin and R. Chang, 2009. Image authentication and tamper detection using two complementary watermarks. Proceeding of the 2009 16th IEEE International Conference on Image Processing (ICIP), November 7-10, 2009, IEEE, Logan, Utah, ISBN:978-1-4244-5653-6, pp: 4257-4260.

Shukla, M.K.M. and M.A.K. Mehta, 2015. A review on digital watermarking techniques, applications and attacks. Int. J. Eng. Comput., 4: 11237-11245.
Direct Link  |  

Sumalatha, L., V.V. Krishna and A.V. Babu, 2012. Image content authentication based on wavelet edge features. Int. J. Comput. Appl., 49: 24-24.
Direct Link  |  

Tiwari, A. and M. Sharma, 2012. Semifragile watermarking schemes for image authentication-A survey. Int. J. Comput. Network Inf. Secur., 4: 43-49.
CrossRef  |  Direct Link  |  

Wang, Z., A.C. Bovik, H.R. Sheikh and E.P. Simoncelli, 2004. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process., 13: 600-612.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved