Authentication watermarkings for binary images

dc.contributor.authorKim H.Y.
dc.contributor.authorPamboukian S.V.D.
dc.contributor.authorBarreto P.S.L.M.
dc.date.accessioned2024-03-13T01:36:35Z
dc.date.available2024-03-13T01:36:35Z
dc.date.issued2008
dc.description.abstractData hiding (DH) is a technique used to embed a sequence of bits in a cover image with small visual deterioration and the means to extract it afterwards. Authentication watermarking (AW) techniques use DH to insert particular data into an image, in order to detect later any accidental or malicious alterations in the image, as well as to certify that the image came from the right source. In recent years, some AWs for binary images have been proposed in the literature. The authentication of binary images is necessary in practice, because most scanned and computer-generated document images are binary. This publication describes techniques and theories involved in binary image AW: We describe DH techniques for binary images and analyze which of them are adequate to be used in AWs; analyze the most adequate secret- and public-key cryptographic ciphers for the AWs; describe how to spatially localize the alteration in the image (besides detecting it) without compromising the security; present AWs for JBIG2-compressed binary images; present a reversible AW for binary images; and finally present our conclusions and future research. © 2009, IGI Global.
dc.description.firstpage1
dc.description.lastpage23
dc.identifier.doi10.4018/978-1-59904-869-7.ch001
dc.identifier.urihttps://dspace.mackenzie.br/handle/10899/37466
dc.relation.ispartofMultimedia Forensics and Security
dc.rightsAcesso Restrito
dc.titleAuthentication watermarkings for binary images
dc.typeCapítulo de livro
local.scopus.citations5
local.scopus.eid2-s2.0-78651585080
local.scopus.updated2024-05-01
local.scopus.urlhttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=78651585080&origin=inward
Arquivos