A NOVEL PUBLIC KEY SELF-EMBEDDING FRAGILE WATERMARKING TECHNIQUE FOR IMAGE AUTHENTICATION

被引:0
作者
Hassan, Ammar M. [1 ]
Hasan, Yassin M. Y. [2 ,3 ]
Al-Hamadi, Ayoub [1 ]
Wahab, Mohamed A. A. [4 ]
Michaelis, Bernd [1 ]
机构
[1] Otto Von Guericke Univ, Inst Elect Signal Proc & Commun IESK, Magdeburg, Germany
[2] Assiut Univ, EE Dept, Assiut, Egypt
[3] Taibah Univ, CSI Dept, Madina, Saudi Arabia
[4] Menia Univ, Al Minya, Egypt
来源
2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6 | 2009年
关键词
Digital signature; image authentication; public key; vector quantization attack; watermarking;
D O I
10.1109/ICIP.2009.5413551
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital images are vulnerable to various malicious manipulations. So, effective techniques are demanded for assuring the integrity of image contents. In this paper, a public key self-embedding image authentication technique is proposed which can detect and localize alterations of the image contents and can restore the distorted regions. A doubly linked chain is used to embed block signature copies and two block codes into relatively distant blocks. Each block code can not only approximately rebuild a distorted block but also can, combined with another block code, rebuild the block with high quality. Moreover, the proposed technique uses a public key in the verification process that enables verification of the image authenticity without knowing the private key used in the embedding process. The experimental results show that the proposed technique is sensitive to pixel changes and provides secure embedding of the blockwise image signatures. Furthermore, it thwarts many attacks, specially the collage (also called vector quantization, blind copy, or pattern matching) attacks and can successively recover the image attacked areas.
引用
收藏
页码:1261 / +
页数:2
相关论文
共 15 条
[1]  
[Anonymous], S CONT SEC DAT HID D
[2]  
CELIK M, 2002, IEEE T IMAGE PRO JUN
[3]  
FRIDRICH J, 1999, P ICIP 99 KOB JAP
[4]  
HASAN YM, 2007, P IEEE ISSPIT 07 CAI
[5]  
HASAN YMY, 2004, P IEEE ISSPIT 04 ROM
[6]  
HOLLIMAN M, 2000, IEEE T IMAGE PRO MAR
[7]  
LAN T, 1999, P ACM MULT 98 ORL FA
[8]  
LIN C, 2001, P ACM MULT 01 OTT CA
[9]  
LUE H, 2008, IEICE T INF SYST D, V91
[10]  
Menezes AJ., 2001, HDB APPL CRYPTOGRAPH