Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Protecting Web images from attacks to prove the real owner
Al-Nu’aimi A.  ISWSA 2011 (Proceedings of the 2011 International Conference on Intelligent Semantic Web Services and Applications, Amman, Jordan, Apr 18-20, 2011)1-5.2011.Type:Proceedings
Date Reviewed: Jul 12 2011

It is important to establish the ownership of images published over the Internet, and this paper proposes an adaptive algorithm based on the general nature of images. Convincing results show how owners can use a watermark that, on the one hand, is not visible to the human eye, but that, on the other hand, proves 100 percent successful for ownership recognition.

The key to the algorithm is that it uses binary logos and small images that examine secret information to encode the ownership information in the final image. Al-Nu’aimi shows how it is always possible to retrieve the watermark from the host image, thus proving its robustness. The peak signal-to-noise ratio (PSNR) and Microsoft Security Essentials (MSE) validate the objective results.

Reviewer:  George Popescu Review #: CR139230 (1202-0218)
Bookmark and Share
  Reviewer Selected
 
 
Authentication (K.6.5 ... )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Unauthorized Access (K.6.5 ... )
 
 
Security and Protection (D.4.6 )
 
 
Security and Protection (K.6.5 )
 
 
Social Issues (K.4.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Authentication": Date
Cyberpunk
Hafner K., Markoff J., Simon & Schuster, Inc., New York, NY, 1991. Type: Book (9780671778798)
Nov 1 1993
How to sign digital streams
Gennaro R., Rohatgi P. Information and Computation 165(1): 100-116, 2001. Type: Article
Dec 1 2001
Signature schemes based on the strong RSA assumption
Cramer R., Shoup V. ACM Transactions on Information and System Security 3(3): 161-185, 2000. Type: Article
Mar 1 2001
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy