Multipurpose watermarking for image authentication and protection

We propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host image's wavelet coefficients as masking threshold units (MTUs), two complementary watermarks are emb...

Ausführliche Beschreibung

Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society. - 1992. - 10(2001), 10 vom: 15., Seite 1579-92
1. Verfasser: Lu, C S (VerfasserIn)
Weitere Verfasser: Liao, H M
Format: Online-Aufsatz
Sprache:English
Veröffentlicht: 2001
Zugriff auf das übergeordnete Werk:IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
Schlagworte:Journal Article
LEADER 01000naa a22002652 4500
001 NLM177433523
003 DE-627
005 20231223150215.0
007 cr uuu---uuuuu
008 231223s2001 xx |||||o 00| ||eng c
024 7 |a 10.1109/83.951542  |2 doi 
028 5 2 |a pubmed24n0592.xml 
035 |a (DE-627)NLM177433523 
035 |a (NLM)18255500 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
100 1 |a Lu, C S  |e verfasserin  |4 aut 
245 1 0 |a Multipurpose watermarking for image authentication and protection 
264 1 |c 2001 
336 |a Text  |b txt  |2 rdacontent 
337 |a ƒaComputermedien  |b c  |2 rdamedia 
338 |a ƒa Online-Ressource  |b cr  |2 rdacarrier 
500 |a Date Completed 14.12.2009 
500 |a Date Revised 25.06.2010 
500 |a published: Print 
500 |a Citation Status PubMed-not-MEDLINE 
520 |a We propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host image's wavelet coefficients as masking threshold units (MTUs), two complementary watermarks are embedded using cocktail watermarking and they can be blindly extracted without access to the host image. For the purpose of image protection, the new scheme guarantees that, no matter what kind of attack is encountered, at least one watermark can survive well. On the other hand, for the purpose of image authentication, our approach can locate the part of the image that has been tampered with and tolerate some incidental processes that have been executed. Experimental results show that the performance of our multipurpose watermarking scheme is indeed superb in terms of robustness and fragility 
650 4 |a Journal Article 
700 1 |a Liao, H M  |e verfasserin  |4 aut 
773 0 8 |i Enthalten in  |t IEEE transactions on image processing : a publication of the IEEE Signal Processing Society  |d 1992  |g 10(2001), 10 vom: 15., Seite 1579-92  |w (DE-627)NLM09821456X  |x 1941-0042  |7 nnns 
773 1 8 |g volume:10  |g year:2001  |g number:10  |g day:15  |g pages:1579-92 
856 4 0 |u http://dx.doi.org/10.1109/83.951542  |3 Volltext 
912 |a GBV_USEFLAG_A 
912 |a SYSFLAG_A 
912 |a GBV_NLM 
912 |a GBV_ILN_350 
951 |a AR 
952 |d 10  |j 2001  |e 10  |b 15  |h 1579-92