Security

Fragile Watermarking for Image Authentication: Survey

Free registration required

Executive Summary

In this paper, the authors report results from comparative study on various related and relevant aspects of the digital watermarking such as image authentication techniques using fragile watermarking, fuzzy clustering and genetically inspired watermarking techniques for integrity verification. This is carried out with intent to develop an understanding of their working, contained challenges, possible attack scenarios, advantages and limitations. Digitizing of multimedia data has enabled reliable, faster and efficient storage, transfer and processing of digital data.

  • Format: PDF
  • Size: 110.7 KB