Open Access

Block–wise authentication method for digital images

[1] HAOUZIA, A.-NOUMEIR, R. : Methods for Image Authentication: a Survey, Multimedia Tools and Applications, 2007.10.1007/s11042-007-0154-3Search in Google Scholar

[2] ADAMO,-MOHANTY, S. P.-KOUGIANOS,-VARANASI, V. : VLSI Architecture for Encryption and Watermarking Units Towards the Making of a Secure Digital Camera, in Proc. of the IEEE International SOC Conference, 2006, pp. 141-144.10.1109/SOCC.2006.283868Search in Google Scholar

[3] BLYTH, P.-FRIDRICH, J. : Secure Digital Camera, in Proc. Digital Forensic Research Workshop, 2004.Search in Google Scholar

[4] NELSON, G. R.-JULLIEN, G. A.-PECHT, O. Y. : CMOS Image Sensor with Watermarking Capabilities, in Proc. of the IEEE International Symposium on Circuits and Systems, 2005, pp. 5326-5329.Search in Google Scholar

[5] MOHANTY, S. P.-KOUGIANOS, E.-RANGANATHAN, N. : VLSI Architecture and Chip for Combined Invisible Robust and Fragile Watermarking, IET computers and digital Techniques 1 No. 5 (2007), 600-611.10.1049/iet-cdt:20070057Search in Google Scholar

[6] KARTHIGAIKUMAR, P.-BASKARAN, K. : An ASIC Implementation of a Low Power Robust Invisible Watermarking Processor, Journal of Systems Architecture 57 No. 4 (2011), 404-411.10.1016/j.sysarc.2010.03.008Search in Google Scholar

[7] WONG, W. : A Public Key Watermark for Image Verification and Authentication, in Proc. of the IEEE International Conference on Image Processing, vol. 1, 1998, pp. 455-459.Search in Google Scholar

[8] PUHAN, N. B.-HO, A. T. S. : Secure Authentication Watermarking for Localization Against Holliman-Memon Attack, Multimedia Systems 12 No. 6 (2007), 521-532.10.1007/s00530-006-0068-3Search in Google Scholar

[9] WONG, P. W.-MEMON, N. : Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification, IEEE Trans. Image Process. 10 No. 10 (2001), 1593-1601.10.1109/83.95154318255501Search in Google Scholar

[10] CELIK, M. U.-SHARMA, G.-SABER, E.-TEKALP, A. M. : Hierarchical Watermarking for Secure Image Authentication with Localization, IEEE Trans. Image Process. 11 No. 6 (2002), 585-595.10.1109/TIP.2002.101499018244657Search in Google Scholar

[11] HOLLIMAN, M.-MEMON, N. : Counterfeiting Attacks on Oblivious Block-Wise Independent Invisible Watermarking Schemes, IEEE Trans. Image Process. 9 No. 3 (2000), 432-441.10.1109/83.82678018255414Search in Google Scholar

[12] FRIDRICH, J. : Security of Fragile Authentication Watermarks with Localization, in Proc. SPIE, vol. 4675, 2002, pp. 349-356.Search in Google Scholar

[13] SCHAEFER, G.-STICH, M. : UCID - An Uncompressed Colour Image Database, Technical Report, School of Computing and Mathematics, Nottingham Trent University, U.K, 2003.10.1117/12.525375Search in Google Scholar

[14] http://www.imageprocessingplace.com/root files V3/ image databases.htm.Search in Google Scholar

[15] KOSARAJU, N. M.-VARANASI, M.-MOHANTY, S. P. : A High Performance VLSI Architecture for Advanced Encryption Standard(AES) Algorithm, in Proc. of the 19th IEEE International Conference on VLSI Design, 2006, pp. 481-484.10.1109/VLSID.2006.9Search in Google Scholar

[16] GOOD, T.-BENAISSA, M. : AES on FPGA from the Fastest to the Smallest, in Proc. of CHES, 2005, pp. 427-440.10.1007/11545262_31Search in Google Scholar

ISSN:
1335-3632
Language:
English
Publication timeframe:
6 times per year
Journal Subjects:
Engineering, Introductions and Overviews, other