Open Access   Article Go Back

An Extensive Survey of Image Integrity Approaches and Its Perspectives

Amit Bhagat1 , Rajshree Dubey2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 138-142, May-2015

Online published on May 30, 2015

Copyright © Amit Bhagat , Rajshree Dubey . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amit Bhagat , Rajshree Dubey, “An Extensive Survey of Image Integrity Approaches and Its Perspectives,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.138-142, 2015.

MLA Style Citation: Amit Bhagat , Rajshree Dubey "An Extensive Survey of Image Integrity Approaches and Its Perspectives." International Journal of Computer Sciences and Engineering 3.5 (2015): 138-142.

APA Style Citation: Amit Bhagat , Rajshree Dubey, (2015). An Extensive Survey of Image Integrity Approaches and Its Perspectives. International Journal of Computer Sciences and Engineering, 3(5), 138-142.

BibTex Style Citation:
@article{Bhagat_2015,
author = { Amit Bhagat , Rajshree Dubey},
title = {An Extensive Survey of Image Integrity Approaches and Its Perspectives},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {138-142},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=494},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=494
TI - An Extensive Survey of Image Integrity Approaches and Its Perspectives
T2 - International Journal of Computer Sciences and Engineering
AU - Amit Bhagat , Rajshree Dubey
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 138-142
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2396 2336 downloads 2562 downloads
  
  
           

Abstract

The Storage of digital information is increasing day by day and at the same time new multimedia broadcasting services has also been developed. This development motivated research on copyright-protection and authentication schemes to be applied to these services. One Possible solution is to apply labelling which is a low level system that works upon the bit-stream. Another one is a high level, graphically inlaid, non-deletable system i.e. watermarking. This paper focuses on authentication and watermarking and presents methods that are proposed for the particular cases of still images. The effects of these methods to JPEG and other image formats are to be analyzed, as well as its sensitivity to image manipulations, are expounded and evaluated.

Key-Words / Index Term

Image Integrity, Image Cropping, Watermarking

References

[1] Dr. Joachim von zur Gathen , Mahmoud El-Gayyar “Watermarking Techniques Spatial Domain Digital Rights” Seminar Media Informatics University of Bonn Germany May 06
[2] Preeti Gupta, “Cryptography based digital image watermarking algorithm to increase security of watermark data”, International
Journal of Scientific & Engineering Research, Volume 3, Issue 9 (September 2012) ISSN 2229-5518
[3] B Surekha, Dr GN Swamy, “A Spatial Domain Public Image Watermarking”, International Journal of Security and Its Applications Vol. 5 No. 1, January, 2011
[4] C. Rey, J.L. Dugelay, “A Survey of Watermarking Algorithms for Image Authentication”, EURASIP Journal on Applied Signal Processing 2002:6, pp. 613 – 621, Hindawi Publishing Corporation.
[5] M. Schneider and S. F. Chang, “A robust content based digital signature for image authentication,” 12 in Proc. IEEE Intl. Conf. On Image Processing, vol. III, Lausanne, Switzerland, September 1996, pp. 227- 230.
[6] J.S. Seo, C.D. Yoo, “Image Watermarking based on scale space representation”, Security, Steganography, and Watermarking of Multimedia Contents, VI, SPIE vol. 5306 2004, pp. 560 – 570
[7] P. W. Wong, “A watermark for image integrity and ownership verification,” in Proc. IS & T PICConference, Portland, USA, May 1998.
[8] P. W. Wong, “A Public Key Watermark for Image Verification and Authentication,” in Proc. IEEEIntl. Conf. On Image Processing, vol. I, Chicago, USA, October 1998, pp. 455-459.
[9] M. Wu and B. Liu, “Watermarking for Image Authentication,” in Proc. IEEE Intl. Conf. On Image Processing, vol. II, Chicago, USA, October 1998, pp. 437-441.
[10] M. Yeung and F. Minzter, “Invisible Watermarking for Image Verification,” Journal of Electronic Imaging, vol. 7, no. 3, pp. 578-591, July 1998.
[11] J. Fridrich, M. Goljan and A. C. Baldoza, “New Fragile Authentication Watermark for Images,” in Proc. IEEE Int. Conf. Image Processing, vol. I, Vancouver, Canada, Sept. 2000, pp. 446-449.
[13] Frank Hartung, Martin Kutter(July 1999), “Multimedia Watermarking Techniques”, proceedings of The IEEE, Vol. 87, No. 7, pp. 1085 – 1103.
[14] Lu, C-S., Liao, H-Y., M., Huang, S-K., Sze, C-J., “ CombinedWa- termarking for Images Authentication and Protection” , in 1st IEEE- International Conference on Multimedia and Expo, vol. 3, 30 July-2Aug. 2000 pp. 1415 – 1418
[16] Jiang Xuehua, “Digital Watermarking and Its Application in Image Copyright Protection”, 2010 International Conference on Intelligent Computation Technology and Automation
[17] Wu, C. and W. Hsieh, 2000, “Digital watermarking using zero tree of DCT”, IEEE Trans. Consumer Electronics, vol. 46, No. 1, pp. 87-94.
[18] Ms.Jalpa M.Patel,”A brief survey on digital image watermarking techniques” ,International Journal For Technological Research In Engineering Volume 1, Issue 7, March-2014
[19 ]Vinita Gupta, “A Review on Image Watermarking and Its Techniques” International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 4, Issue 1, January 2014.
[20] Prabhishek Singh “A Survey of Digital Watermarking Techniques, Applications and Attacks” ,International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 9, March 2013
[21]Xiao Jun Kang Li Jun Dong, “Study of the Robustness of Watermarking Based on Image Segmentation and DFT”, IEEE International Conference on Information Engineering and Computer Science, ICIECS, 2009, pp1-4.