<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">GOLEA, Nour-El-Houda</style></author><author><style face="normal" font="default" size="100%">Melkemi, Kamal-Eddine</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Feature-based Fragile Watermarking for Tamper Detection using Voronoi Diagram Decomposition</style></title><secondary-title><style face="normal" font="default" size="100%"> 10th International Conference on Computer Science, Engineering and Applications (CCSEA 2020)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2020</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">https://aircconline.com/csit/papers/vol10/csit101012.pdf</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p style=&quot;text-align: justify;&quot;&gt;
	In this paper, we have proposed a novel feature-based fragile watermarking scheme for image authentication. The proposed technique extracts Feature Points (FP) by performing the Harris corner detector and used them as germs to decomposes the host image in segments using Voronoi Diagram (VD). The authentication of each segment is guaranteed by using the Cyclic Redundancy Check code (CRC). Then, the CRC encoding procedure is applied to each segment to generate the watermark. Voronoi decomposition is employed because it has a good retrieval performance compared to similar geometrical decomposition algorithms. The security aspect of our proposed method is achieved by using the public key crypto-system RSA (Rivest–Shamir–Adleman) to encrypt the FP. Experimental results demonstrate the efficiency of our approach in terms of imperceptibility, the capability of detection of alterations, the capacity of embedding, and computation time. We have also prove the impact of VD decomposition on the quality of the watermarked image compared to block decomposition. The proposed method can be applicable in the case where the tamper detection is critical and only some regions of interest must be re-transmitted if they are corrupted, like in the case of medical images. An example of the application of our approach to medical image is briefly presented.
&lt;/p&gt;
</style></abstract></record></records></xml>