Tampering with a watermarking-based image authentication scheme
We analyse a recent image authentication scheme designed by Chang et al. [A watermarking-based image ownership and tampering authentication scheme, Pattern Recognition Lett. 27 (5) (2006) 439–446] whose first step is based on a watermarking scheme of Maniccam and Bourbakis [Lossless compression and...
Saved in:
Main Author: | |
---|---|
Format: | Default Article |
Published: |
2008
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/8160 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|