Narzędzia help

Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
first last
cannonical link button

http://yadda.icm.edu.pl:80/baztech/element/bwmeta1.element.baztech-article-BUS8-0008-0078

Czasopismo

Fundamenta Informaticae

Tytuł artykułu

An Image Authentication Based on Discrete Fourier Transform

Autorzy Kieu, T.D.  Chang, C-C. 
Treść / Zawartość
Warianty tytułu
Języki publikacji EN
Abstrakty
EN The advances of network technologies and digital devices facilitate users to exchange multimedia data over the public networks. However, this also raises significant concerns about how to protect sensitive multimedia data from being illegally copied and unauthorized modifications. Thus, this paper proposes a fragile watermarking method to detect illegitimate alterations of the watermarked data. The proposed method embeds a grayscale watermark image into a grayscale cover image in a block-by-block manner by using discrete Fourier transform. Experimental results show that the proposedmethod can successfully and exactly detect and localize any tampered regions of the watermarked image.
Słowa kluczowe
EN information hiding   watermarking   Fourier transform  
Wydawca IOS Press
Czasopismo Fundamenta Informaticae
Rocznik 2009
Tom Vol. 97, nr 4
Strony 369--379
Opis fizyczny Bibliogr. 6 poz., fot., tab.
Twórcy
autor Kieu, T.D.
autor Chang, C-C.
  • Department of Information Engineering and Computer Science Feng Chia University, No. 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan, R.O.C., ccc@cs.ccu.edu.tw
Bibliografia
[1] Cox, I. J., Miller, M. L., Bloom, J. A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, Morgan Kauffman, USA, 2007.
[2] Davis, R.M.: The Data Encryption Standard in Perspective, IEEE CommunicationsMagazine, 16(6), November 1978, 5-9.
[3] Gonzales, R. C., Woods, R. E.: Digital Image Processing, Prentice Hall, USA, 2002.
[4] Petitcolas, F. A. P., Anderson, R. J., Kuhn,M. G.: Information Hiding-a Survey, Proc. IEEE, July 1999.
[5] Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-key Cryptosystems, Communications of the ACM, 21(2), February 1978, 120-126.
[6] Zhou, X., Yuan, S., Li, D., Hu, J.: A Method for Hiding Information Utilizing Double-Random Phase-Encoding Technique, Optics & Laser Technology, 39(7), October 2007, 1360-1363.
Kolekcja BazTech
Identyfikator YADDA bwmeta1.element.baztech-article-BUS8-0008-0078
Identyfikatory