Embedding of Metadata and Authentication of an Image via the use of PNG Image with Data Integrity
Abstract
Keywords
Full Text:
PDFReferences
M. U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, “Hierarchical watermarking for secure image authentication with localization,” IEEE Trans. Image Processing, vol.11, no.6, pp.585-595, june.2002.
C. W. Lee and W. H. Tsai, A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability, IEEE Trans. on Image Process. 21 (1) (2012) 207-218.
G. J. Yu, C. S. Lu, and H. Y. M. Liao, Mean quantization-based fragile watermarking for image authentication, Optical Engineering 40 (7) (2001) 1396-1408. 35
Niladri B. Puhan, Anthony T. S. Ho “Binary Document Image Watermarking for Secure Authentication Using Perceptual Modeling” IEEE International Symposium on Signal Processing and Information Technology2005.
J. O. Ruanaidh and T. Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking, Signal Process. 66 (3) (1998) 303-317.
M. Barni, F. Bartolini and T. Furon, A general framework for robust watermarking security, Signal Process. 83 (10) (2003) 2069-2084.
C. Deng, X. Gao, X. Li and D. Tao, A local Tchebichef moments-based robust image watermarking, Signal Processing, 89 (8) (2009) 1531-1539.
X. Gao, X. Li, D. Tao, C. Deng and J. Li, Robust Reversible Watermarking via Clustering and Enhanced Pixel-Wise Masking, IEEE Trans. on Image Process, 21 (8) (2012) 3598-3611.
I. S. Lee and W. H. Tsai, A new approach to covert communication via PDF Files, Signal Process. 90 (2) (2009) 557-565.
T. Y. Liu and W. H. Tsai, A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique, IEEE Transactions on Information Forensics and Security 2 (1) (2007) 24-30, 2007.
Refbacks
- There are currently no refbacks.