Robust authentication scheme for protecting copyrights of images and graphics

CC Chang, KF Hwang, MS Hwang - IEE Proceedings-Vision, Image and Signal …, 2002 - IET
Watermarking techniques are primarily used for copyright protection. A simple and robust
watermark-like digital authentication scheme is proposed. This work has two major merits …

[PDF][PDF] A Robust Watermarking and Image Authentication Scheme used for Digital Contant Application.

CM Kung, ST Chao, YC Tu, YH Yan, CH Kung - Journal of Multimedia, 2009 - Citeseer
The development of computers and Internet has exploded in the last few years. The digital
images are distributed and duplicated easily through WWW, thus the protection of the …

[PDF][PDF] A study on watermarking schemes for image authentication

S Radharani, ML Valarmathi - International Journal of Computer …, 2010 - Citeseer
The digital revolution in digital image processing has made it possible to create, manipulate
and transmit digital images in a simple and fast manner. The adverse affect of this is that the …

Owner–customer right protection mechanism using a watermarking scheme and a watermarking protocol

TH Chen, DS Tsai - Pattern Recognition, 2006 - Elsevier
Over the past few years, there have been more and more robust watermarking schemes
proposed for copyright protection of digital documents. The authors combine cryptography …

Novel and robust image watermarking for copyright protection and integrity control

N Tarhouni, M Charfeddine, C Ben Amar - Circuits, Systems, and Signal …, 2020 - Springer
This paper presents a copyright protection and integrity verification watermarking scheme for
color images. It uses the extracted features of the host image to generate a watermark, which …

A feature-based digital image watermarking for copyright protection and content authentication

JS Tsai, WB Huang, CL Chen… - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
In this paper, a feature-based robust digital image watermarking algorithm is proposed to
achieve the goal of image authentication and protection simultaneously. The Hessian-Affine …

A survey of watermarking algorithms for image authentication

C Rey, JL Dugelay - EURASIP Journal on Advances in Signal Processing, 2002 - Springer
Digital image manipulation software is now readily available on personal computers. It is
therefore very simple to tamper with any image and make it available to others. Insuring …

Combined digital signature and digital watermark scheme for image authentication

T Chen, J Wang, Y Zhou - … Conferences on Info-Tech and Info …, 2001 - ieeexplore.ieee.org
Conventional digital signature schemes for image authentication encode the signature in a
file separate from the original image, thus require extra bandwidth to transmit it. Meanwhile …

[PDF][PDF] A new watermarking technique for multimedia protection

CS Lu, SK Huang, CJ Sze, HY Liao - Multimedia image and video …, 2001 - Citeseer
A robust watermarking scheme for hiding binary or gray-scale watermarks in digital images
is proposed in this chapter. Motivated by the fact that a detector response (a correlation …

A watermarking-based authentication with malicious detection and recovery

P Tsai, YC Hu - 2005 5th International Conference on …, 2005 - ieeexplore.ieee.org
In this paper, a watermarking-based image authentication scheme used to verify the
contents of transmission grayscale images is proposed. In this scheme, the watermark of …