By Topic

Semi fragile watermarking using Gaussian mixture model for malicious image attacks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Gopalakrishnan, T. ; Dept. of Electr. & Electron. Eng., Dr.Mahalingam Coll. of Eng. & Technol., Pollachi, India ; Ramakrishnan, S. ; Balasamy, K. ; Murugavel, A.S.M.

In this paper, the requirements, techniques and applications of digital watermarking for high-quality images were discussed. The several classes of digital watermarking techniques defined by their appearance and application domains specify the requirements and summarize the current research efforts in the image applications. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. For robustness this algorithm should resist all kinds of attacks, such as common signal processing operators, geometric attacks and so on.

Published in:

Information and Communication Technologies (WICT), 2011 World Congress on

Date of Conference:

11-14 Dec. 2011