Watermarking Techniques Spatial Domain Digital Rights Seminar ©

Figure 5\ Detecting forgery attack, (a) The tampered image, (b) The actual region tampered, (c) The difference map with k=9, (d) the difference map with k=7 ...12 Figure 6\ Modified Images of lena, (a) The image lena, (b) The image with the LSB plane and the second LSB plane flipped (c) The image with the LSB plane flipped (d) the image with the second LSB plane flipped ..

[1]  Chang-Tsun Li,et al.  Fragile watermarking scheme exploiting non-deterministic block-wise dependency , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[2]  Edward J. Delp,et al.  Digital watermarking: algorithms and applications , 2001, IEEE Signal Process. Mag..

[3]  Chang-Tsun Li,et al.  One-dimensional neighborhood forming strategy for fragile watermarking , 2003, J. Electronic Imaging.

[4]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[5]  Hal Berghel,et al.  Watermarking cyberspace , 1997, CACM.

[6]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[7]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.