By Topic

A simple method for detecting the possible changes of hidden information of watermarked image in an MMS message

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Shirali-Shahreza, M. ; Comput. Sci. Dept., Sharif Univ. of Technol., Tehran

After expanding the use of computer and its affect on different aspect of life, the copyright issue has gained many attractions. For this purpose watermarking methods are proposed. In these methods a code is embedded into digital material that can be used to approve ownership, it can be visible or invisible to the user. On the other hand with the rapid growth of mobile phones, mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia Messaging Service) in order to attract more customers. MMS is a technology that allows mobile phones sending messages that includes multimedia objects esp. images. For copyright protection of images which are sent through MMS, ones can use watermarking methods. But there is possibility of damaging or changing the hidden information while MMS is transferred. In this paper a new method is proposed for detecting the cause of destroying or changing hidden data in an MMS message. For this purpose, in addition to the image, the copyright notes are also hidden in an audio file and sent along with the image. So while extracting the hidden information from MMS message, if copyright notes which are extracted from both image and audio file are different, it can be concluded that the hidden data are damaged or changed.

Published in:

Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on

Date of Conference:

23-24 April 2008