Academic
Publications
Fragile image watermarking using a gradient image for improved localization and security

Fragile image watermarking using a gradient image for improved localization and security,10.1016/j.patrec.2004.08.017,Pattern Recognition Letters,Shan

Fragile image watermarking using a gradient image for improved localization and security   (Citations: 31)
BibTex | RIS | RefWorks Download
A fragile watermarking algorithm for image authentication and tamper detection is proposed. It uses a gradient image and its structure to achieve localization and security requirements. It provides superior localization with greater security against many attacks including vector quantization attack.
Journal: Pattern Recognition Letters - PRL , vol. 25, no. 16, pp. 1893-1903, 2004
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...While block-wise schemes have been developed to detect blocks containing fake contents [4, 5], some pixel-wise schemes can accurately locate the modified pixels when the tampered area is not too extensive [6]...

    Xinpeng Zhanget al. Self-embedding watermark with flexible restoration quality

    • ...These schemes were mainly to introduce the block-wise dependency by adding new parameters in the hash function, for example, the distinct image index [3, 4, 19], the previous block and hash-code [1], and the gradient image block [16] etc...

    HongJie Heet al. A neighborhood-characteristic-based detection model for statistical fr...

    • ...In block-wise fragile watermarking, the original image is divided into small blocks and the watermark data, e.g., a hash of the content of each block, is embedded into the block itself [1]...
    • ...The new values of all usable pixels are within [1;254]...
    • ...1) Watermark-Data extraction: The received image is first divided into N=64 blocks and N=4 patches in the same manner as in the embedding process, and the pixels in the received image are denoted gm(i;j)(1 m N=64;1 i;j 8). According to the received values, the changeable pixels are divided into two types: the saturated pixels with values 0 or 255, and the unsaturated pixels with values in [1;254]...

    Prasad Patilet al. Fragile Watermarking Scheme for Image Tamper Detection

    • ...On the other hand Suthaharan [8] replaced the image index and the encryption algorithm with master key and session key used to generate a pattern by performing sequence of geometrical distortion into gradient image...

    Debjyoti Basuet al. Bit Plane Index Based Fragile Watermarking Scheme for Authenticating C...

    • ...This paper will be structured as follows; In Section 2 is the introduction of Singular value decomposition and Digital wavelet transform; In Section 3, the watermarking generation and watermarking extraction procedure are presented...
    • ...Fig. 2 shows the two-level wavelet decomposition of an image...
    • ...Fig. 2 shows the two-level wavelet decomposition of an image. Figure 2. Digital Wavelet Transform...
    • ...��������������������> LL��� HL��� L+���++�@ DWT�è� $�� ���� (2) For LL1 standing for the coarse level coefficients, i.e., the approximation image, the subbands LL1 is partitioned into non-overlap blocks with size nn u . (3) Singular value decomposition is performed to each block...
    • ...(2) The subbands LL1 are partitioned into non-overlap blocks with size nn u . (3) Singular value decomposition is performed to each block...
    • ...<{[SECTION]}>[2]Shan Suthaharan “Fragile image watermarking using a gradient...

    Feng Wen-geet al. SVD and DWT zero-bit watermarking algorithm

Sort by: