Cart (Loading....) | Create Account
Close category search window
 

A fragile watermarking scheme for image authentication in mobile devices

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Palma Hernandez, C. ; Dept. de Comput., CINVESTAV-IPN, Mexico City, Mexico ; Torres-Huitzi, C.

With the rapid development of Internet, wireless communication and the camera-capable portable devices, digital images are easily distributed, copied and modified. This aspect is now so important that image content protection has become a major security issue. In recent years, fragile watermarking has been used as a technique to achieve image authentication and tampering localization. The main purpose of this work is to show that with the rapid development of mobile devices, now is possible to construct applications based on watermarking. In this paper, we present an implementation of a fragil watermarking scheme for image authentication in mobile devices. This watermarking scheme is based on chaos theory and was proposed in [1]. In such scheme a fragile signal that is sensitive to manipulations is embedded in the image so as to detect the image tampering inconsistency. The current implementation was made for an Android capable smartphone. Some experimental results regarding localization of tampered regions and execution times are presented. The current fragile image watermarking implementation might be applied to content authentication and integrity attestation in mobile e-commerce and e-governance.

Published in:

Electrical Engineering Computing Science and Automatic Control (CCE), 2011 8th International Conference on

Date of Conference:

26-28 Oct. 2011

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.