Abstract
This chapter serves as an introduction to digital watermarking, and various aspects pertinent to digital watermarking techniques for data authentication are discussed. The chapter is focused on multimedia authentication in general and image authentication in particular. Requirements for watermarking techniques are listed. A classification of watermarking techniques is given followed by a security analysis. Watermarking techniques for image authentication are briefly discussed in the end.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
C. Ling, O. Ur-Rehman, Watermarking for image authentication, in Robust Image Authentication in the Presence of Noise, ed. by N. Zivic (Springer, New York, 2015), pp. 43–74
L. Kumar Saini, V. Shrivastava, A survey of digital watermarking techniques and its applications. Int. J. Comput. Sci. Trends Technol. 2(3) (May-Jun 2014)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Ur-Rehman, O., Zivic, N. (2018). Digital Watermarking for Image Authentication. In: Noise Tolerant Data Authentication for Wireless Communication. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-319-78942-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-78942-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78941-5
Online ISBN: 978-3-319-78942-2
eBook Packages: EngineeringEngineering (R0)