2005
DOI: 10.15388/informatica.2005.085
|View full text |Cite
|
Sign up to set email alerts
|

Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure

Abstract: The paper describes methods for generating image watermark for asymmetric key based watermark embedding and detection scheme in wavelet domain. The proposed method combines DWT-based watermarking and the ability to verify watermark using reliable methods of asymmetric coding. The watermark scheme is developed to be directly incorporated into JPEG2000 image coding standard, while it can be used in existing image coding standards. In presented watermarking method the application of public key infrastructure is e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Binary images show better characteristics because of their definition, however the information they contain is very limited (Ganesan and Guptha, 2010;Valantinas and Zumbakis, 2007). PKI helps to identify authentication, at the cost of lost tamper localization (Kazakeviciute and Januskevicius, 2005).…”
Section: Introductionmentioning
confidence: 99%
“…Binary images show better characteristics because of their definition, however the information they contain is very limited (Ganesan and Guptha, 2010;Valantinas and Zumbakis, 2007). PKI helps to identify authentication, at the cost of lost tamper localization (Kazakeviciute and Januskevicius, 2005).…”
Section: Introductionmentioning
confidence: 99%