The Use of Watermark and Hash Function for the Authentication of Digital Images Mapped through the use of the Wavelet Transform.
Fernanda B. CoelhoJamil Salem BarbarGustavo S. B. do CarmoPublished in: ICIW (2007)
Keyphrases
- digital images
- hash functions
- wavelet transform
- digital watermarking
- authentication protocol
- watermarking technique
- image authentication
- copyright protection
- image coding
- multiresolution
- similarity search
- image compression
- secret key
- multiscale
- wavelet coefficients
- authentication scheme
- jpeg compression
- subband
- feature extraction
- user authentication
- low frequency
- wavelet domain
- watermarking method
- hamming distance
- high frequency
- wavelet filters
- hash tables
- watermarking scheme
- watermark embedding
- hash table
- data distribution
- high dimensional
- watermarked image
- discrete wavelet transform
- hashing methods
- integer wavelet transform
- ridgelet transform