A feature-based digital image watermarking for copyright protection and content authentication

JS Tsai, WB Huang, CL Chen… - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
… location for content authentication is affected since the fragile watermark is not included in
the characteristic regions. In order to improve the local precision, the fragile watermarks will …

Dual watermarking framework for privacy protection and content authentication of multimedia

NN Hurrah, SA Parah, NA Loan, JA Sheikh… - Future generation …, 2019 - Elsevier
… protection and content authentication along with security and privacy of users. Digital
watermarking deals with hiding of secret data watermark) in some digital content which can be …

Spatial watermark for image content authentication

MP Queluz - Journal of Electronic imaging, 2002 - spiedigitallibrary.org
… techniques for content authentication are usually designed to be fragile or semifragile
watermarks, since they should not tolerate malicious tampering that modifies the content of the …

[PDF][PDF] Data authentication using digital watermarking

S Datta, A Nath - International Journal of Advance Research in …, 2014 - researchgate.net
Digital content can be embedded with fragile watermarks that get destroyed whenever
any … is made to the content. Such watermarks can be used to authenticate the content. …

[HTML][HTML] Review on semi-fragile watermarking algorithms for content authentication of digital images

X Yu, C Wang, X Zhou - Future Internet, 2017 - mdpi.com
… The fragile watermark for integrity authentication of image data and protection of copyright
has become a hotspot. In the storage and transmission process, image data must be …

Authentication techniques for multimedia content

ND Memon, PL Vora - Multimedia Systems and Applications, 1999 - spiedigitallibrary.org
… Subsequently, there have been many authentication techniques for … on digital watermarks
and in this paper, we focus on such techniques. There are basically two types of watermarks

Digital watermarking: a potential solution for multimedia authentication

KJ Giri, R Bashir - Intelligent techniques in signal processing for …, 2017 - Springer
… carry the ownership information of the content. The procedure of embedding copyright
information in the form of a digital watermark into digital media is called digital watermarking. …

[PDF][PDF] Video watermarking techniques for copyright protection and content authentication

H Shojanazeri, WAW Adnan, SMS Ahmad - International Journal of …, 2013 - mirlabs.org
… tent authentication the goal is not to retrieve the watermark but … protection and authentication
of contents. As the challenges in … (intra-frame) such as content modification or cropping and …

Watermarking-based digital audio data authentication

M Steinebach, J Dittmann - EURASIP Journal on Advances in Signal …, 2003 - Springer
… Our contribution focuses mainly on the design of a content-… with digital signatures for
high-security applications. We introduce two watermarking algorithms: our first approach is a content

Protecting digital media content

N Memon, PW Wong - Communications of the ACM, 1998 - dl.acm.org
… multimedia content needs special hardware for copying and viewing, a digital watermark can
… algorithm, using an invisible authentication watermark to protect a visible watermark. The …