Comparative Evaluation of Semifragile Watermarking Algorithms
#1

[attachment=694] [attachment=695]
Abstract:
Semifragile watermarking techniques aim to prevent tampering and fraudulent use of modified images. A semifragile watermark monitors the integrity of the content of the image but not its numerical representation. Therefore, the watermark is designed so that the integrity is proven if the content of the image has not been tampered with, despite some mild processing on the image. However, if parts of the image are replaced with the wrong key or are heavily processed, the watermark information should indicate evidence of forgery. We compare the performance of eight semifragile watermarking algorithms in terms of their miss probability under forgery attack, and in terms of false alarm probability under no malicious signal processing operations that preserve the content and quality of the image. We propose desiderata for semifragile watermarking algorithms and indicate the promising algorithms among existing ones

Introduction
One prominent application of watermarking technology is the monitoring of the integrity of the multimedia documents. The specific interest in semi fragile watermarking algorithms arises from the multitude of practical and commercial applications, where content needs to be strictly protected, but the exact representation during exchange and storage need not be guaranteed. The alterations on the documents can occur unintentionally or can be implanted intentionally. The so-called unintentional or innocent alterations typically arise from such diverse facts as bit errors during transmission and storage, or signal processing operations such as altering contrast enhancement, sharpening, and compression. Intentional or malicious alterations, on the other hand, are assumed to be due to an explicit forgery attempt by a pirate with the explicit purpose of changing the contents of a document. The main distinction then, is whether the content is altered as in malicious and intentional attacks or whether only the representation, but not the content, of the document is altered, as occurs in unintentional, no malicious cases. The line of demarcation between these two attacks categories is, however, not al- ways clear-cut, as it depends very much on the application domain. A case in point is histogram equalization, where, if the representation of the lighting condition is considered informative, it then becomes a malicious manipulation; alternately, it remains simply a well-intentioned contrast enhancement.


Brief:
Prominent application of watermarking technology is monitoring of the integrity of multimedia documents, Semifragile watermark monitors the integrity of the content of the image but not its numerical representation
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: watermarking cox, watermarking a, types of watermarking algorithms, watermarking dvds, comparative evaluation of semifragile watermarking algorithms, different watermarking algorithms, srs of watermarking,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Computerized Paper Evaluation using Neural Network computer science crazy 12 17,855 17-07-2013, 04:08 PM
Last Post: Guest
Photo Digital Watermarking Full Seminar Report Download computer science crazy 83 53,885 06-02-2013, 12:33 PM
Last Post: Guest
  Digital Image Watermarking project report helper 3 5,663 19-12-2012, 11:48 AM
Last Post: seminar details
  BLACK HOLE ATTACKS IN AD HOC NETWORKS USING TRUST VALUE EVALUATION SCHEME full report seminar presentation 2 9,816 02-11-2012, 12:28 PM
Last Post: seminar details
  Algorithms and Issues In Client Software Design computer girl 0 1,141 06-06-2012, 03:23 PM
Last Post: computer girl
  Digital watermarking: algorithms and applications computer science topics 1 3,660 02-03-2012, 10:20 AM
Last Post: seminar paper
  Watermarking schemes evaluation seminar class 1 1,177 14-02-2012, 03:48 PM
Last Post: seminar paper
  e-Evaluation smart paper boy 0 1,065 18-06-2011, 03:51 PM
Last Post: smart paper boy
  Performance evaluation of EAR routing protocol for fixed power sensor networks seminar class 1 1,422 09-05-2011, 07:12 PM
Last Post: rafik
  Evaluation of the Efficacy of FEC Coding In Combating Network Packet Losses project topics 0 1,151 02-05-2011, 09:57 AM
Last Post: project topics

Forum Jump: