Dual watermarking framework for privacy protection and content authentication of multimedia

NN Hurrah, SA Parah, NA Loan, JA Sheikh… - Future generation …, 2019 - Elsevier
… protection and content authentication along with security and privacy of users. Digital
watermarking deals with hiding of secret data watermark) in some digital content which can be …

A feature-based digital image watermarking for copyright protection and content authentication

JS Tsai, WB Huang, CL Chen… - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
… location for content authentication is affected since the fragile watermark is not included in
the characteristic regions. In order to improve the local precision, the fragile watermarks will …

Spatial watermark for image content authentication

MP Queluz - Journal of Electronic imaging, 2002 - spiedigitallibrary.org
… techniques for content authentication are usually designed to be fragile or semifragile
watermarks, since they should not tolerate malicious tampering that modifies the content of the …

Review on semi-fragile watermarking algorithms for content authentication of digital images

X Yu, C Wang, X Zhou - Future Internet, 2017 - mdpi.com
… ; KMA denotes that the attacker not only has mastered the data involving watermarks, but
also grasped some contents of watermarks, and that the secret key can be estimated through a …

[PDF][PDF] Data authentication using digital watermarking

S Datta, A Nath - International Journal of Advance Research in …, 2014 - researchgate.net
Digital content can be embedded with fragile watermarks that get destroyed whenever
any … is made to the content. Such watermarks can be used to authenticate the content. …

Authentication techniques for multimedia content

ND Memon, PL Vora - Multimedia Systems and Applications, 1999 - spiedigitallibrary.org
… One such class of techniques is based on digital watermarks and in this paper, we … watermarks
that have been proposed for purposes of authentication, Fragile Watermarks and Content

Protecting digital media content

N Memon, PW Wong - Communications of the ACM, 1998 - dl.acm.org
… multimedia content needs special hardware for copying and viewing, a digital watermark can
… algorithm, using an invisible authentication watermark to protect a visible watermark. The …

[PDF][PDF] Video watermarking techniques for copyright protection and content authentication

H Shojanazeri, WAW Adnan, SMS Ahmad - International Journal of …, 2013 - mirlabs.org
… tent authentication the goal is not to retrieve the watermark but … protection and authentication
of contents. As the challenges in … (intra-frame) such as content modification or cropping and …

[图书][B] Techniques and applications of digital watermarking and content protection

M Arnold, M Schmucker, SD Wolthusen - 2002 - books.google.com
watermarks depends considerably on precisely … that of content protection for which digital
watermarks are also very … consider threats to the digital watermarks or the mechanisms used …

The use of watermarks in the protection of digital multimedia products

G Voyatzis, I Pitas - Proceedings of the IEEE, 1999 - ieeexplore.ieee.org
Content verification system based on private watermarking and public accessibility to
authentication servers. DCh, QCh, and VCh denote the distribution, verification request, and reply …