Cryptography Reference
In-Depth Information
(a)
(b)
The tampered image by swapping
two blocks of the same image
The tampered image by copying a
portion of another image
(c)
(d)
The result of fragile detection cor-
responding to (a)
The result of fragile detection cor-
responding to (b)
Fig. 13.16. The tampered image and the result of using fragile detection.
on reversible watermarking techniques still continue to be restricted in two
aspects. That is, robustness and the provision of high-capacity.
References
1. Honsinger, C., Jones, P., Rabbani, M., and Stoffel, J. (1999): US Patent, No.
US6278791
2. Macq, B. and Deweyand, F. (1999): Trusted headers for medical images. DFG
VIII-D II Watermarking Workshop
Search WWH ::




Custom Search