scholarly journals Image authentication with tampering localization based on watermark embedding in wavelet domain

2009 ◽  
Vol 48 (5) ◽  
pp. 057002 ◽  
Author(s):  
Chih-Chung Hsu
2012 ◽  
Vol 6-7 ◽  
pp. 525-529
Author(s):  
Guang Xue Chen ◽  
Bao Lin Tang ◽  
Qi Feng Chen ◽  
Jing Lei Tai

In this paper, the key research was focused on the algorithm based on wavelet domain after analyzing and comparing several watermark algorithms. Disperse Wave Transform(DWT) watermark and Disperse Cosine Transform(DCT) watermark are both belong to transform domain technology, and they have more robustness than spatial-temporal domain technology, and DWT is superior to DCT. DWT can use the spatial-frequency characteristics of Human Visual System, and Mosaic will not appear in reconstruct image. DWT also can use image fusion technology to disperse watermark into multiple scales of carrier data, and got more robustness. In this paper, watermark embedding based on wavelet domain in which raster data are carrier was performed, then extracting and detecting watermark were done. Experiment results show that digital watermark based on wavelet domain will get better invisibility and robustness, and can be used in following the data by digital fingerprint.


Author(s):  
V. E. Fotopoulos ◽  
I. D. Kostopoulos

This chapter introduces JPEG 2000 as an application field for image authentication and the new technology of digital image watermarking. The new compression format has many unexplored characteristics that both the watermarking and the authentication communities should carefully take into account. Thus, a brief introduction to the standard is given at the beginning, discussing its structure, features, novelties, and capabilities. Following that introduction, watermarking techniques are presented, at first into the wavelet domain (the DWT is part of the JPEG2000 core), and then into the JPEG 2000 pipeline. The effects of the various standards’ parameters in this process are carefully investigated. Then, authentication mechanisms of JPEG 2000 images are described and we peek into JPSEC, part-8 of JPEG 2000 that deals with issues of watermarking and authentication.


Sign in / Sign up

Export Citation Format

Share Document