期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Reversible Semi-Fragile Watermarking Technique for Integrity Control of Relational Database
1
作者 Ali Hamadou Abdoul Aziz Issaka Hassane +1 位作者 Lanciné Camara Harouna Naroua 《Engineering(科研)》 2024年第9期309-323,共15页
Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differ... Reversible watermarking schemes for relational database are usually classified into two groups: robust schemes and fragile schemes. The main limitation of existing reversible fragile methods is that they cannot differentiate between legal and malicious modifications. In this paper, we introduce a novel lossless semi-fragile scheme based on prediction-error expansion for content protection of relational database. In the proposed method, all attributes in a database relation are first classified according to their sensitivity to legitimate updates. Then, the watermark is embedded by expanding the prediction error of the two least significant digits of securely selected attributes. At watermark extraction, the proposed method has the ability to fully restore the original data while detecting and localizing tampering. The applicability of our method is demonstrated theoretically and experimentally. 展开更多
关键词 semi-fragile Watermarking Integrity Control Reversibility Prediction-Error Expansion
下载PDF
Image Authentication Based on Digital Signatureand Semi-Fragile Watermarking 被引量:1
2
作者 Hong-BinZhang ChengYang Xiao-MeiQuan 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第6期752-759,共8页
This paper proposes an authentication scheme for JPEG images based on digital signature and semi-fragile watermarking. It can detect and locate malicious manipulations made to the image, and verify the ownership of th... This paper proposes an authentication scheme for JPEG images based on digital signature and semi-fragile watermarking. It can detect and locate malicious manipulations made to the image, and verify the ownership of the image at the same time. The algorithm uses the invariance of the order relationship between two DCT coefficients before and after JPEG compression to embed image content dependent watermark, therefore the watermark can survive the JPEG lossy compression. Since the scheme is based on the security of the cryptographic hash function and public key algorithm, it is believed to be secure to the extent that cryptography is believed to be. Theoretical analysis and experimental results show that the proposed scheme has the desired property and good performance for image authentication. 展开更多
关键词 image authentication semi-fragile watermarking JPEG digital signature
原文传递
Wavelet Based Image Authentication and Recovery 被引量:3
3
作者 Rafiullah Chamlaw Asifullah Khan Adnan Idris 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第6期795-804,共10页
In this paper, we propose a secure semi-fragile watermarking technique based on integer wavelet transform with a choice of two watermarks to be embedded. A self-recovering algorithm is employed, that hides the image d... In this paper, we propose a secure semi-fragile watermarking technique based on integer wavelet transform with a choice of two watermarks to be embedded. A self-recovering algorithm is employed, that hides the image digest into some wavelet subbands for detecting possible illicit object manipulation undergone in the image. The semi-fragility makes the scheme tolerant against JPEG lossy compression with the quality factor as low as 70%, and locates the tampered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced by using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees safety of a watermark, recovery of image and localization of tampered area. 展开更多
关键词 semi-fragile watermark integer wavelet transform (IWT) discrete cosine transform (DCT) JPEG compression authentication and self-recovery
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部