A performance analysis of the authentication method proposed by J. Fridrich and M. Goljan is carried out. This method has the particular feature that both the embedder and the det...
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8
The wide use of digital media during the past few years, has led to an increase of digital piracy and tampering. To deal with these problems, the concept of watermarking has been i...
If digital watermarking is to adequately protect content in systems which provide both resolution and quality scalability, then the watermarking algorithms used must provide both ...
Angela Piper, Reihaneh Safavi-Naini, Alfred Mertin...