Wong and Memon =-=-=- use the security of a proven cryptographic hash function for a block-wise independent digital watermarking scheme to work against the counterfeiting attack.
Kim, Real-Time Blind Watermarking Algorithm and its Hardware Implementation for Motion JPEG2000 Image Codec, in: Proceedings of the 1stWorkshop on Embedded Systems for Real-Time Multimedia, 2003, pp.
Second, Strict Authentication Watermarking with JPEG Compression (SAW-JPEG) uses the same principal as SAW, but is able to survive some degree of JPEG compression.
Kougianos, "VLSI Architecture of an Invisible Watermarking Unit for a Biometric-Based Security System in a Digital Camera", in Proceedings of the 25th IEEE International Conference on Consumer Electronics (ICCE), pp.
Watermarking schemes for authentication purposes are characterized by three factors namely security, resolution of tamper localization, and embedding distortion.
In this paper we examine the security of the Yeung-Mintzer authentication watermarking technique and show that it is vulnerable to different types of impersonation and substitution attacks whereby an attacker is able to either create or modify images that would be considered as authentic.
In this paper we examine the security of the Yeung-Mintzer authentication watermarking technique and show that it is vulnerable to different types of impersonation and substitutio ..."
Experimental results show that embedded watermarks using the proposed techniques can give good image quality and are robust in varying degree to JPEG compression, low-pass filtering, noise contamination, and print-and-scan.
This system is capable of enhancing the security during the transmission of medical images through a wireless channel, in two ways: initially by using the default IEEE 802.11 security, WEP and additionally by applying DFRFT domain digital watermarking to the medical images before transmitting them through the wireless channel.