{"title":"基于水印的数字图像认证研究进展","authors":"Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen","doi":"10.1109/CCOMS.2018.8463259","DOIUrl":null,"url":null,"abstract":"This paper discusses fragile watermarking techniques in image authentication technology, which can be divided into recoverable and unrecoverable methods. Recoverable technology is to use reversible data hiding method to hide the authentication code, and not to hide the recovery information. So after the image tampered, it only can locate the tampered area. The unrecoverable technique is to use the LSB substitution method to hide the authentication code and the recovery information, so that the image can be changed after the image tampered. In this paper, four different image authentication methods are comprehensively discussed and compared, including features, image quality and error rates.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"A Survey of Watermarking-Based Authentication for Digital Image\",\"authors\":\"Chin-Feng Lee, Jau-Ji Shen, Zhao-Ru Chen\",\"doi\":\"10.1109/CCOMS.2018.8463259\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper discusses fragile watermarking techniques in image authentication technology, which can be divided into recoverable and unrecoverable methods. Recoverable technology is to use reversible data hiding method to hide the authentication code, and not to hide the recovery information. So after the image tampered, it only can locate the tampered area. The unrecoverable technique is to use the LSB substitution method to hide the authentication code and the recovery information, so that the image can be changed after the image tampered. In this paper, four different image authentication methods are comprehensively discussed and compared, including features, image quality and error rates.\",\"PeriodicalId\":405664,\"journal\":{\"name\":\"2018 3rd International Conference on Computer and Communication Systems (ICCCS)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 3rd International Conference on Computer and Communication Systems (ICCCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCOMS.2018.8463259\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCOMS.2018.8463259","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey of Watermarking-Based Authentication for Digital Image
This paper discusses fragile watermarking techniques in image authentication technology, which can be divided into recoverable and unrecoverable methods. Recoverable technology is to use reversible data hiding method to hide the authentication code, and not to hide the recovery information. So after the image tampered, it only can locate the tampered area. The unrecoverable technique is to use the LSB substitution method to hide the authentication code and the recovery information, so that the image can be changed after the image tampered. In this paper, four different image authentication methods are comprehensively discussed and compared, including features, image quality and error rates.