J4 ›› 2010, Vol. 28 ›› Issue (04): 419-.

Previous Articles     Next Articles

Fragile Watermarking Scheme Used in Content Features Complete Authentication

LIU Jinga|ZHU Xiao-dongb|LI Da-weic   

  1. aCollege of Mathematics;bCollege of Computer Science and Technology;cCenter for Computer Fundamental Education|Jilin University|Changchun |130012,China
  • Online:2010-07-27 Published:2010-08-31

Abstract:

We studied watermark scheme used in content features complete authentication to velidate if the image was juggled in processing. Based on the application requirements analysis, we have built general protocol to be followed during watermark embedding. A fragile watermarking scheme was implemented followed by watermarking protocol and fragile watermarking algorithm. As hash elements, participating product singular value of image, the authentication codes have been generated in the scheme. We compressed low bit flat of image by MHC(Midified Huffman Codeing) coding. According to the experimental results, it can completely meet the application requirements.

Key words: security information, fragile watermark, content authentication, singular valuedecomposition

CLC Number: 

  • TP393