Javascript must be enabled to continue!
Secure Watermarking using Diophantine Equations for Authentication and Recovery
View through CrossRef
This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands. The security lies in the difficulty of finding a solution to the Diophantine equation. The scheme uses the content invariant features of the image as a self-authenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences. The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression. The scheme also ensures highly imperceptible watermarked images as the spatio –frequency properties of DWT are utilized to embed the dual watermarks.
Title: Secure Watermarking using Diophantine Equations for Authentication and Recovery
Description:
This paper describes an authentication scheme that uses Diophantine equations based generation of the secret locations to embed the authentication and recovery watermark in the DWT sub-bands.
The security lies in the difficulty of finding a solution to the Diophantine equation.
The scheme uses the content invariant features of the image as a self-authenticating watermark and a quantized down sampled approximation of the original image as a recovery watermark for visual authentication, both embedded securely using secret locations generated from solution of the Diophantine equations formed from the PQ sequences.
The scheme is mildly robust to Jpeg compression and highly robust to Jpeg2000 compression.
The scheme also ensures highly imperceptible watermarked images as the spatio –frequency properties of DWT are utilized to embed the dual watermarks.
Related Results
Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
The illegal act of digital multimedia data loss the value of information and integrity. The loss of information and integrity born the process of piracy of digital data. The piracy...
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, ill...
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Abstract
In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the express...
Current therapeutic strategies for erectile function recovery after radical prostatectomy – literature review and meta-analysis
Current therapeutic strategies for erectile function recovery after radical prostatectomy – literature review and meta-analysis
Radical prostatectomy is the most commonly performed treatment option for localised prostate cancer. In the last decades the surgical technique has been improved and modified in or...
Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis
Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermark...
Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking
Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking
<p>Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content a...
Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on ...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...

