acm - an acm publication

Articles

Secure delivery of handwritten signature

Ubiquity, Volume 2006 Issue October | BY Debnath Bhattacharyya , Samir Kumar Bandyopadhyay , Anindya Jyoti Pal 

|

Full citation in the ACM Digital Library

A number of researchers have proposed using digital marks to provide ownership (watermarking) identification for the property. One way of data hiding is digital signature, copyright label or digital watermark that completely characterizes the person who applies it and, therefore, marks it as being his property. Digital Watermarking is the process that embeds data called a watermark into an object such that watermark can be detected and extracted later to make an assertion about the object. Watermarking is either "visible" or "invisible". Although visible and invisible are visual terms watermarking is not limited to images, it can also be used to protect other types of multimedia object. Our research work is on watermarking techniques in particular.Many of these proposed techniques share three specific weaknesses: complexity of copy detection, vulnerability to mark removal after revelation for ownership verification, and mark integrity issues due to partial mark removal. This paper presents a method for watermarking Handwritten Signature that achieves robustness by responding to these three weaknesses. The key techniques involve using secure functions to generate and embed image marks that is more detectable, verifiable, and secure than existing protection and detection techniques.


[This article is available as a PDF only. It originally appeared on Ubiquity, Volume 7, Issue 40 (October 17, 2006 - October 23, 2006).]

COMMENTS

the article "Secure delivery of handwritten signature

��� Ignatiua Makgoka, Thu, 13 Dec 2012 10:50:33 UTC

Regarding to getting the article "Secure delivery of handwritten signature" searched from ACM library, I am referred to this page. Am I supposed to write a comment here before I get to receive the article in PDF format? Otherwise, how can I possibly receive a copy this article for my academic research? Your help will be greatly appreciated. Thanks!

��� Ann Chow, Tue, 10 Jan 2012 23:42:22 UTC

POST A COMMENT
Leave this field empty