Binary image authentication with tampering localization by embedding cryptographic signature and block identifier

H Yang, AC Kot - IEEE signal processing letters, 2006 - ieeexplore.ieee.org
This letter proposes a novel two-layer blind binary image authentication scheme, in which
the first layer is targeted at the overall authentication and the second layer is targeted at …

On establishing edge adaptive grid for bilevel image data hiding

H Cao, AC Kot - IEEE transactions on information forensics and …, 2013 - ieeexplore.ieee.org
We propose, in this paper, a novel edge-adaptive data hiding method for authenticating
binary host images. Through establishing a dense edge-adaptive grid (EAG) along the …

A new public-key authentication watermarking for binary document images resistant to parity attacks

HY Kim - IEEE International Conference on Image Processing …, 2005 - ieeexplore.ieee.org
An authentication watermarking technique (AWT) inserts some hidden data into an image in
order to detect any accidental or malicious image alteration. Recent papers have proposed …

Authenticating using secret key in digital video watermarking using 3-level DWT

S Shoaib, RC Mahajan - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
Authenticating watermarking is nothing but inserting a hidden object in order to detect
deceitful alteration by hackers. The object may be in terms of a secret key or password etc …

EAG: Edge adaptive grid data hiding for binary image authentication

H Cao, AC Kot - Proceedings of The 2012 Asia Pacific Signal …, 2012 - ieeexplore.ieee.org
This paper proposes a novel data hiding method for authenticating binary images through
establishing dense edge adaptive grids (EAG) for invariantly selecting good data carrying …

Steganalysis of binary cartoon image using distortion measure

J Cheng, AC Kot, S Rahardja - 2007 IEEE International …, 2007 - ieeexplore.ieee.org
We present a steganalysis technique for data hiding in binary cartoon images. Due to the
perturbation from the embedding, the contours of a stego binary cartoon image are distorted …

Watermarking JBIG2 text region for Image Authentication

SVD Pamboukian, HY Kim… - … Conference on Image …, 2005 - ieeexplore.ieee.org
An authentication watermarking technique (AWT) inserts hidden data into an image in order
to detect any accidental or malicious alteration to the image. AWT usually computes, using a …

Two-layer binary image authentication with tampering localization

H Yang, AC Kot - … Conference on Acoustics Speech and Signal …, 2006 - ieeexplore.ieee.org
In this paper, a novel two-layer blind binary image authentication scheme is proposed, in
which the first layer is targeted at the overall authentication and the second layer is targeted …

A general data hiding framework and multi-level signature for binary images

H Yang, AC Kot - International Workshop on Digital Watermarking, 2007 - Springer
This paper reviews techniques for binary images data hiding and watermarking and
proposes a general framework for authentication purposes. Finally, a multi-level signature …

New public-key authentication watermarking for JBIG2 resistant to parity attacks

SVD Pamboukian, HY Kim - International Workshop on Digital …, 2005 - Springer
An authentication watermark is a hidden data inserted into an image that allows detecting
any alteration made in the image. AWTs (Authentication Watermarking Techniques) …