Watermarking JBIG2 text region for image authentication

dc.contributor.authorPamboukian S.V.D.
dc.contributor.authorKim H.Y.
dc.contributor.authorDe Queiroz R.L.
dc.date.accessioned2024-03-13T01:44:15Z
dc.date.available2024-03-13T01:44:15Z
dc.date.issued2005
dc.description.abstractAn authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, using a secret-key, the message authentication code (MAC) of the image, and somehow inserts MAC into the image itself. The authentication verification is performed using the same secret-key used in the insertion. JBIG2 is an international standard for lossy and lossless binary image compression. It decomposes the image into several regions (text, halftone, line-art) and encodes each one using the most appropriate method. This paper proposes a novel data-hiding technique to embed the data into the text region of a JBIG2 file. We, then, use it to create an AWT for a JBIG2-encoded image. The embedded data can be extracted from either the JBIG2 file itself or the binary image obtained by decoding the JBIG2 file. © 2005 IEEE.
dc.description.firstpage1075
dc.description.lastpage1078
dc.description.volume2
dc.identifier.doi10.1109/ICIP.2005.1530246
dc.identifier.issn1522-4880
dc.identifier.urihttps://dspace.mackenzie.br/handle/10899/37887
dc.relation.ispartofProceedings - International Conference on Image Processing, ICIP
dc.rightsAcesso Restrito
dc.titleWatermarking JBIG2 text region for image authentication
dc.typeArtigo de evento
local.scopus.citations3
local.scopus.eid2-s2.0-33749592429
local.scopus.subjectAuthentication watermarking technique (AWT)
local.scopus.subjectBinary image compression
local.scopus.subjectHidden data
local.scopus.subjectMessage authentication code (MAC)
local.scopus.updated2024-05-01
local.scopus.urlhttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=33749592429&origin=inward
Arquivos