A wavelet-based public key image authentication watermarking

被引:0
作者
Chen, CC [1 ]
Fan, KC [1 ]
Wang, SW [1 ]
机构
[1] Hsuan Chuang Univ, Dept Informat Management, Hsinchu 300, Taiwan
来源
37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS | 2003年
关键词
image authentication; public key; hash function; wavelet transform;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we introduce a new wavelet-based image authentication approach that the proposed approach can detect attacks on an authenticated image and indicate the modification area. The proposed authentication procedure first applies the image into a 3-level wavelet transform and the fingerprint of each subimage's block is then encrypted by a cryptosystem to replace the LSB of the block. The block's fingerprint is obtained by calculating the hash value of the block, its neighboring blocks, and its coarse approximation in low-pass subimage. The verification step only requires the user's public key to check whether the new calculated fingerprint is consistent with the decryption result of the LSB. Experimental results show that the proposed approach detects attacks including spatial or wavelet coefficients replacement efficiently, whereas the modification area is clearly indicated.
引用
收藏
页码:321 / 324
页数:4
相关论文
共 50 条
  • [21] Wavelet-based multicomponent image restoration
    Duijster, Arno
    De Backer, Steve
    Scheunders, Paul
    WAVELET APPLICATIONS IN INDUSTRIAL PROCESSING V, 2007, 6763
  • [22] Wavelet-based medical image compression
    Kofidis, E
    Kolokotronis, N
    Vassilarakou, A
    Theodoridis, S
    Cavouras, D
    FUTURE GENERATION COMPUTER SYSTEMS, 1999, 15 (02) : 223 - 243
  • [23] Watermarking for image authentication
    Wu, M
    Liu, BD
    1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, 1998, : 437 - 441
  • [24] Mean-quantization-based fragile watermarking for image authentication
    Yu, GJ
    Lu, CS
    Liao, HYM
    OPTICAL ENGINEERING, 2001, 40 (07) : 1396 - 1408
  • [25] Binary Image Authentication Based on Watermarking Algorithm
    Masoodifar, Behrang
    Hashemi, S. Mojtaba
    Zarei, Omid
    THIRD INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2011), 2011, 8009
  • [26] Medical Image Authentication Based on Revertible Watermarking
    Abd-Eldayem, Mohamed M.
    2014 9TH INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS), 2014,
  • [27] FEATURE BASED WATERMARKING SCHEME FOR IMAGE AUTHENTICATION
    Liu, Hongmei
    Rao, Junhui
    Yao, Xinzhi
    2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, : 229 - 232
  • [28] A Robust Wavelet-Based Watermarking Algorithm Using Edge Detection
    Ellinas, John N.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 25, 2007, 25 : 438 - 443
  • [29] Tamper-proof image watermarking, based on existing public key infrastructure
    Kazakeviciute, G
    Januskevicius, E
    Rosenbaum, R
    Schumann, H
    INFORMATICA, 2005, 16 (01) : 75 - 92
  • [30] Semisubsampled Wavelet Transform Based Image Watermarking
    Hou, Yingkun
    Zhao, Chunxia
    Zhu, Lili
    Liu, Mingxia
    Yang, Deyun
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II, 2009, : 348 - +