A Survey of Watermarking Algorithms for Image Authentication View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2002-06-26

AUTHORS

Christian Rey, Jean-Luc Dugelay

ABSTRACT

Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques. More... »

PAGES

218932

Identifiers

URI

http://scigraph.springernature.com/pub.10.1155/s1110865702204047

DOI

http://dx.doi.org/10.1155/s1110865702204047

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1063207664


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Multimedia Department, Eurecom Institute, 2229 route de Cr\u00eates, B.P. 193, F-06904, Sophia Antipolis, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Multimedia Department, Eurecom Institute, 2229 route de Cr\u00eates, B.P. 193, F-06904, Sophia Antipolis, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rey", 
        "givenName": "Christian", 
        "id": "sg:person.012234712564.67", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012234712564.67"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Multimedia Department, Eurecom Institute, 2229 route de Cr\u00eates, B.P. 193, F-06904, Sophia Antipolis, France", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Multimedia Department, Eurecom Institute, 2229 route de Cr\u00eates, B.P. 193, F-06904, Sophia Antipolis, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dugelay", 
        "givenName": "Jean-Luc", 
        "id": "sg:person.015053427343.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015053427343.37"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2002-06-26", 
    "datePublishedReg": "2002-06-26", 
    "description": "Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques.", 
    "genre": "article", 
    "id": "sg:pub.10.1155/s1110865702204047", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": [
      {
        "id": "sg:journal.1371279", 
        "issn": [
          "1687-6172", 
          "1687-0433"
        ], 
        "name": "EURASIP Journal on Advances in Signal Processing", 
        "publisher": "Springer Nature", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "6", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "2002"
      }
    ], 
    "keywords": [
      "content authentication", 
      "image authentication", 
      "effective authentication scheme", 
      "image content authentication", 
      "digital image integrity", 
      "image manipulation software", 
      "authentication scheme", 
      "image tampering", 
      "watermarking algorithm", 
      "image integrity", 
      "manipulation software", 
      "strict integrity", 
      "authentication", 
      "personal computer", 
      "key techniques", 
      "copyright enforcement", 
      "popular technique", 
      "algorithm", 
      "major issue", 
      "tampering", 
      "software", 
      "computer", 
      "security", 
      "technique", 
      "task", 
      "images", 
      "scheme", 
      "protocol", 
      "notion", 
      "features", 
      "issues", 
      "enforcement", 
      "integrity", 
      "overview", 
      "method", 
      "particular emphasis", 
      "emphasis", 
      "place", 
      "survey", 
      "aim", 
      "majority", 
      "paper", 
      "Digital image manipulation software"
    ], 
    "name": "A Survey of Watermarking Algorithms for Image Authentication", 
    "pagination": "218932", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1063207664"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1155/s1110865702204047"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1155/s1110865702204047", 
      "https://app.dimensions.ai/details/publication/pub.1063207664"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2022-01-01T18:12", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/article/article_359.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://doi.org/10.1155/s1110865702204047"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1155/s1110865702204047'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1155/s1110865702204047'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1155/s1110865702204047'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1155/s1110865702204047'


 

This table displays all metadata directly associated to this object as RDF triples.

108 TRIPLES      21 PREDICATES      68 URIs      60 LITERALS      6 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1155/s1110865702204047 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N1a94037db1974f56b077af676305922c
4 schema:datePublished 2002-06-26
5 schema:datePublishedReg 2002-06-26
6 schema:description Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Insuring digital image integrity has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of emerging techniques for detecting whether image tampering has taken place. Compared to the techniques and protocols for security usually employed to perform this task, the majority of the proposed methods based on watermarking, place a particular emphasis on the notion of content authentication rather than strict integrity. In this paper, we introduce the notion of image content authentication and the features required to design an effective authentication scheme. We present some algorithms, and introduce frequently used key techniques.
7 schema:genre article
8 schema:inLanguage en
9 schema:isAccessibleForFree true
10 schema:isPartOf N81194c380736415793a6005314f754b7
11 Nacdeb5d6eece48098be92d0f5993fe44
12 sg:journal.1371279
13 schema:keywords Digital image manipulation software
14 aim
15 algorithm
16 authentication
17 authentication scheme
18 computer
19 content authentication
20 copyright enforcement
21 digital image integrity
22 effective authentication scheme
23 emphasis
24 enforcement
25 features
26 image authentication
27 image content authentication
28 image integrity
29 image manipulation software
30 image tampering
31 images
32 integrity
33 issues
34 key techniques
35 major issue
36 majority
37 manipulation software
38 method
39 notion
40 overview
41 paper
42 particular emphasis
43 personal computer
44 place
45 popular technique
46 protocol
47 scheme
48 security
49 software
50 strict integrity
51 survey
52 tampering
53 task
54 technique
55 watermarking algorithm
56 schema:name A Survey of Watermarking Algorithms for Image Authentication
57 schema:pagination 218932
58 schema:productId N50d43c1b3f9943d798d7b16d506af5ad
59 Nb9910bdcd290481f83a1fd969dee2fda
60 schema:sameAs https://app.dimensions.ai/details/publication/pub.1063207664
61 https://doi.org/10.1155/s1110865702204047
62 schema:sdDatePublished 2022-01-01T18:12
63 schema:sdLicense https://scigraph.springernature.com/explorer/license/
64 schema:sdPublisher N98a7a2b8d4a24a0d9a368d7cf32ea707
65 schema:url https://doi.org/10.1155/s1110865702204047
66 sgo:license sg:explorer/license/
67 sgo:sdDataset articles
68 rdf:type schema:ScholarlyArticle
69 N1a94037db1974f56b077af676305922c rdf:first sg:person.012234712564.67
70 rdf:rest N417e39e550fc4e4bac07193ebe685fdf
71 N417e39e550fc4e4bac07193ebe685fdf rdf:first sg:person.015053427343.37
72 rdf:rest rdf:nil
73 N50d43c1b3f9943d798d7b16d506af5ad schema:name dimensions_id
74 schema:value pub.1063207664
75 rdf:type schema:PropertyValue
76 N81194c380736415793a6005314f754b7 schema:issueNumber 6
77 rdf:type schema:PublicationIssue
78 N98a7a2b8d4a24a0d9a368d7cf32ea707 schema:name Springer Nature - SN SciGraph project
79 rdf:type schema:Organization
80 Nacdeb5d6eece48098be92d0f5993fe44 schema:volumeNumber 2002
81 rdf:type schema:PublicationVolume
82 Nb9910bdcd290481f83a1fd969dee2fda schema:name doi
83 schema:value 10.1155/s1110865702204047
84 rdf:type schema:PropertyValue
85 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
86 schema:name Information and Computing Sciences
87 rdf:type schema:DefinedTerm
88 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
89 schema:name Artificial Intelligence and Image Processing
90 rdf:type schema:DefinedTerm
91 sg:journal.1371279 schema:issn 1687-0433
92 1687-6172
93 schema:name EURASIP Journal on Advances in Signal Processing
94 schema:publisher Springer Nature
95 rdf:type schema:Periodical
96 sg:person.012234712564.67 schema:affiliation grid-institutes:None
97 schema:familyName Rey
98 schema:givenName Christian
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012234712564.67
100 rdf:type schema:Person
101 sg:person.015053427343.37 schema:affiliation grid-institutes:None
102 schema:familyName Dugelay
103 schema:givenName Jean-Luc
104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015053427343.37
105 rdf:type schema:Person
106 grid-institutes:None schema:alternateName Multimedia Department, Eurecom Institute, 2229 route de Crêtes, B.P. 193, F-06904, Sophia Antipolis, France
107 schema:name Multimedia Department, Eurecom Institute, 2229 route de Crêtes, B.P. 193, F-06904, Sophia Antipolis, France
108 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...