Cart (Loading....) | Create Account
Close category search window

Quantifying the Visual Content Perceived in DCT Coefficients and PKI Based Semi-fragile Watermarking for Visual Content Authentication of Images

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Atupelage, C. ; Dept. of Inf. Eng., Hiroshima Univ., Higashi-Hiroshima, Japan ; Harada, K.

Multimedia data is always exposed for the security threats, because these data can be easily alter by using multimedia data processing tools. Therefore content owners always endure of copyright protection and ownership verification of their digital assets. Digital watermarking is the technology introduces to overcome these limitations. There are different watermarking technologies which focusing different security aspects. Proving the authenticity of digital multimedia data, the watermarking concept was commenced called fragile watermarking. However, evolution of the fragile watermark derives a prospective watermarking concept called semi-fragile watermark, which overcomes several limitations of fragile watermarking such as fragility for trusted image manipulations. Multimedia data consisted huge amount of information; however, most of them are not in the perceptible region of Human Visual System (HVS). In this paper, we presented an experiment that quantifies the perceptible information perceived in DCT domain and a new PKI (Public Key Infrastructure) based semi-fragile watermarking technique that quantitatively authenticates perceptible content of the digital images. Additionally, our definition localizes the compromised regions of the image. The proposed method inherits all security features in public key authentication system. In practice, visual distortions are acceptable up to some extent in digital multimedia applications. Therefore, distortions due to the watermark should be minimized. Moreover, this paper presents a critical analysis of the parameterization of watermark embedding technique and its analysis matrices (graphs & tables), which can be used to optimize the watermarking method according to the userpsilas requirements.

Published in:

World Congress on Engineering and Computer Science 2008, WCECS '08. Advances in Electrical and Electronics Engineering - IAENG Special Edition of the

Date of Conference:

22-24 Oct. 2008

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.