Watermarking-based image authentication robust to JPEG compression


A watermarking-based mostly image authentication theme in the discrete cosine transform (DCT) domain robust to JPEG compression is presented. The binary authentication code is generated from a pseudo-random sequence based on a secret key and a block-dependent feature, protecting the scheme against cut-and-paste attacks. The watermark is embedded in low-frequency DCT coefficients selected by the key key employing a changed quantisation index modulation approach. Before embedding, the chosen coefficients are quantised using the JPEG quantisation matrix for a particular quality issue, protecting the theme against JPEG compression with higher quality factors. Experimental results show that the proposed technique achieves terribly smart watermark imperceptibility and is in a position to detect and locate malicious attacks with sensible precision. Compared with other existing schemes, the proposed algorithm achieves better performance concerning false positive and false negative detection rates and in discriminating malicious attacks from JPEG compression.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Robust, Efficient Depth Reconstruction with Hierarchical Confidence-Based Matching - 2017ABSTRACT:In recent years, taking photos and capturing videos with mobile devices became increasingly standard. Emerging applications
PROJECT TITLE :Smart Skins: Could they be the ultimate sensing tool? TodayuFFFDs industry and personal medical care both strongly demand accurate, reliable, robust, loABSTRACT:Today???s trade and private medical care both strongly
PROJECT TITLE :A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNsABSTRACT:Ensuring information aggregation integrity introduces new challenges for information aggregation security protocols
PROJECT TITLE : R3E Reliable Reactive Routing Enhancement for Wireless Sensor Networks - 2014 ABSTRACT: Providing reliable and efficient communication under fading channels is one of the major technical challenges in wireless
PROJECT TITLE : Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks - 2014 ABSTRACT: Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry