CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Article:Security on Fragile and Semi-fragile Watermarks Authentication

by Shilpi Saha, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 4
Year of Publication: 2010
Authors: Shilpi Saha, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay
10.5120/721-1013

Shilpi Saha, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay . Article:Security on Fragile and Semi-fragile Watermarks Authentication. International Journal of Computer Applications. 3, 4 ( June 2010), 23-27. DOI=10.5120/721-1013

@article{ 10.5120/721-1013,
author = { Shilpi Saha, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay },
title = { Article:Security on Fragile and Semi-fragile Watermarks Authentication },
journal = { International Journal of Computer Applications },
issue_date = { June 2010 },
volume = { 3 },
number = { 4 },
month = { June },
year = { 2010 },
issn = { 0975-8887 },
pages = { 23-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume3/number4/721-1013/ },
doi = { 10.5120/721-1013 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:51:02.573248+05:30
%A Shilpi Saha
%A Debnath Bhattacharyya
%A Samir Kumar Bandyopadhyay
%T Article:Security on Fragile and Semi-fragile Watermarks Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 3
%N 4
%P 23-27
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Ensuring digital image security has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of some possible attacks which may cause harm the present watermarking techniques. Here we have identified the attacks which frequently attacks some very well known fragile and semifragile watermarking techniques..

References
Index Terms

Computer Science
Information Sciences

Keywords

Attack image authentication watermark fragile semi-fragile security private key public key