Techniques for Content-Based Graph Authentication

In addition to images and text, more and more documents use graphs for system and idea illustration. Compared to grayscale images, graphs are more difficult to watermark because of their binary nature. We propose two methodologies for digital graph authentication, at the object and pixel levels, that detect and localize alterations.

[1]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[2]  Lawrence O'Gorman,et al.  Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.

[3]  Alberto Del Bimbo Guest Editor's Introduction: Multimedia Computing and Systems , 2000, IEEE Multim..

[4]  Shih-Fu Chang,et al.  Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.

[5]  Minerva M. Yeung,et al.  Fragile imperceptible digital watermark with privacy control , 1999, Electronic Imaging.

[6]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[7]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[8]  Ralf Steinmetz,et al.  Robust MPEG video watermarking technologies , 1998, MULTIMEDIA '98.

[9]  Edward K. Wong,et al.  Marking and detection of text documents using transform-domain techniques , 1999, Electronic Imaging.

[10]  Aude Billard,et al.  A biologically inspired robotic model for learning by imitation , 2000, AGENTS '00.

[11]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.