Binary image authentication with tampering localization by embedding cryptographic signature and block identifier
This letter proposes a novel two-layer blind binary image authentication scheme, in which
the first layer is targeted at the overall authentication and the second layer is targeted at …
the first layer is targeted at the overall authentication and the second layer is targeted at …
On establishing edge adaptive grid for bilevel image data hiding
We propose, in this paper, a novel edge-adaptive data hiding method for authenticating
binary host images. Through establishing a dense edge-adaptive grid (EAG) along the …
binary host images. Through establishing a dense edge-adaptive grid (EAG) along the …
A new public-key authentication watermarking for binary document images resistant to parity attacks
HY Kim - IEEE International Conference on Image Processing …, 2005 - ieeexplore.ieee.org
An authentication watermarking technique (AWT) inserts some hidden data into an image in
order to detect any accidental or malicious image alteration. Recent papers have proposed …
order to detect any accidental or malicious image alteration. Recent papers have proposed …
Authenticating using secret key in digital video watermarking using 3-level DWT
S Shoaib, RC Mahajan - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Authenticating watermarking is nothing but inserting a hidden object in order to detect
deceitful alteration by hackers. The object may be in terms of a secret key or password etc …
deceitful alteration by hackers. The object may be in terms of a secret key or password etc …
EAG: Edge adaptive grid data hiding for binary image authentication
This paper proposes a novel data hiding method for authenticating binary images through
establishing dense edge adaptive grids (EAG) for invariantly selecting good data carrying …
establishing dense edge adaptive grids (EAG) for invariantly selecting good data carrying …
Steganalysis of binary cartoon image using distortion measure
We present a steganalysis technique for data hiding in binary cartoon images. Due to the
perturbation from the embedding, the contours of a stego binary cartoon image are distorted …
perturbation from the embedding, the contours of a stego binary cartoon image are distorted …
Watermarking JBIG2 text region for Image Authentication
SVD Pamboukian, HY Kim… - … Conference on Image …, 2005 - ieeexplore.ieee.org
An authentication watermarking technique (AWT) inserts hidden data into an image in order
to detect any accidental or malicious alteration to the image. AWT usually computes, using a …
to detect any accidental or malicious alteration to the image. AWT usually computes, using a …
Two-layer binary image authentication with tampering localization
In this paper, a novel two-layer blind binary image authentication scheme is proposed, in
which the first layer is targeted at the overall authentication and the second layer is targeted …
which the first layer is targeted at the overall authentication and the second layer is targeted …
A general data hiding framework and multi-level signature for binary images
This paper reviews techniques for binary images data hiding and watermarking and
proposes a general framework for authentication purposes. Finally, a multi-level signature …
proposes a general framework for authentication purposes. Finally, a multi-level signature …
New public-key authentication watermarking for JBIG2 resistant to parity attacks
SVD Pamboukian, HY Kim - International Workshop on Digital …, 2005 - Springer
An authentication watermark is a hidden data inserted into an image that allows detecting
any alteration made in the image. AWTs (Authentication Watermarking Techniques) …
any alteration made in the image. AWTs (Authentication Watermarking Techniques) …