Proceedings of the Seventh ACM International Conference on Multimedia (Part 2) 1999
DOI: 10.1145/319878.319887
|View full text |Cite
|
Sign up to set email alerts
|

Fraud detection and self embedding

Abstract: In this paper we address the issue of fraud detection in multimedia distribution.We use the self embedding approach to solve the problem.Self embedding serves to detect and recover possible tampered multimedia data. To use this approach, we design a powerful high capacity data embedding algorithm with l/167(1 bit out of 167 raw image bits)-l/84 hiding ratios subject to JPEG compression with the quality factor equals to 75. With such high embedding capacity, one can easily embed some important regions of an ima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2000
2000
2009
2009

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…The authors in [2] also show that their proposed technique could resist rotation and scaling to some extent. v The concept of self-embedding [101], that is embedding important parts of an image (for example, the eyes of a person) onto the image itself, is important to detect (and if possible recover from) a tampering attack in which a portion of the image has been altered. In [101] the authors proposed a high capacity watermarking technique that is capable of detecting tampering and to some extent recover from it.…”
Section: September 2000 Ieee Signal Processing Magazine 41mentioning
confidence: 99%
“…The authors in [2] also show that their proposed technique could resist rotation and scaling to some extent. v The concept of self-embedding [101], that is embedding important parts of an image (for example, the eyes of a person) onto the image itself, is important to detect (and if possible recover from) a tampering attack in which a portion of the image has been altered. In [101] the authors proposed a high capacity watermarking technique that is capable of detecting tampering and to some extent recover from it.…”
Section: September 2000 Ieee Signal Processing Magazine 41mentioning
confidence: 99%
“…Self-embedding techniques for proof of authenticity and image protection as in Fridrich and Goljan, 12 Lan and Tewfik, 13 and in the case of video in Robie and Mersereau. 14 Proposed algorithms can be self authenticating or independently authenticating.…”
Section: -11mentioning
confidence: 99%
“…Inserting a fake mark must be impractical. Enormous fragile [9][10][11][12][13][14][15][16], semi-fragile [17][18][19], hybrid fragile-robust [29][30][31], self-embedding/correction [23][24][25][26][27][28] watermarking schemes have recently been presented for multimedia data authentication/data integrity.…”
Section: Introductionmentioning
confidence: 99%
“…To gather the different features of fragile-robust/semi-fragile watermarking as needed, some recent algorithms have combined the use of fragile and robust/semi-fragile watermarking algorithms schemes [29][30][31]. Furthermore, to not only localize altered regions but also compensate for the damage, self-embedding/auto-correction watermarking techniques have lately been presented that embed an image approximation/visual hash [20][21][22] into the image itself in a fragile [26,27] or semi-fragile/robust [23][24][25]28] way using various techniques as given in Section 2.…”
Section: Introductionmentioning
confidence: 99%