The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Performing Security on Digital Images
|
Author(s): Abdallah Soualmi (Ferhat Abbas University, Algeria), Lamri Laouamer (Qassim University, Saudi Arabia)and Adel Alti (Ferhat Abbas University, Algeria)
Copyright: 2019
Pages: 36
Source title:
Exploring Security in Software Architecture and Design
Source Author(s)/Editor(s): Michael Felderer (University of Innsbruck, Austria)and Riccardo Scandariato (Chalmers University of Technology, Sweden & University of Gothenburg, Sweden)
DOI: 10.4018/978-1-5225-6313-6.ch009
Purchase
|
Abstract
In image watermarking, information is embedded in the original image for many reasons, such as ownership proofing, alteration detection, and/or fingerprinting, but it can also be used for real-time services such as e-payment, broadcast monitoring, and surveillance systems. For these, the data embedded must be extractable even if the image is manipulated intentionally or unintentionally. In contrast, robust techniques are the kind of watermarking that could assure the authenticity and protect the copyright. Many robust image watermarking approaches have been proposed in the last few years, and the purpose of this chapter is to provide a survey about recent relevant robust image watermarking methods existing in the literature.
Related Content
Babita Srivastava.
© 2024.
21 pages.
|
Sakuntala Rao, Shalini Chandra, Dhrupad Mathur.
© 2024.
27 pages.
|
Satya Sekhar Venkata Gudimetla, Naveen Tirumalaraju.
© 2024.
24 pages.
|
Neeta Baporikar.
© 2024.
23 pages.
|
Shankar Subramanian Subramanian, Amritha Subhayan Krishnan, Arumugam Seetharaman.
© 2024.
35 pages.
|
Charu Banga, Farhan Ujager.
© 2024.
24 pages.
|
Munir Ahmad.
© 2024.
27 pages.
|
|
|