1 December 2006 Digital watermarking scheme exploiting nondeterministic dependence for image authentication
Author Affiliations +
Optical Engineering, 45(12), 127001 (2006). doi:10.1117/1.2402932
Abstract
Watermarking schemes for authentication purposes are characterized by three factors: security, resolution of tamper localization, and embedding distortion. Since the requirements of high security, high localization resolution, and low distortion cannot be fulfilled simultaneously, the relative importance of a particular factor is application-dependent. Moreover, blockwise dependence is recognized as a key requirement for fragile watermarking schemes to thwart the Holliman-Memon counterfeiting attack. However, it has also been observed that deterministic dependence is still susceptible to transplantation attack or even simple cover-up attack. This work proposes a fragile watermarking scheme for image authentication, which exploits nondeterministic dependence and provides the users with freedom of making trade-offs among the three factors according to the needs of their applications.
Chang-Tsun Li, Yinyin Yuan, "Digital watermarking scheme exploiting nondeterministic dependence for image authentication," Optical Engineering 45(12), 127001 (1 December 2006). https://doi.org/10.1117/1.2402932
JOURNAL ARTICLE
6 PAGES


SHARE
RELATED CONTENT


Back to Top