Alteration-Locating Authentication Watermarking for Binary Images

نویسندگان

  • Hae Yong Kim
  • Ricardo L. de Queiroz
چکیده

In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small number of cryptography-based secure authentication methods are available for binary images. This paper proposes a new authentication watermarking method for binary images. It can detect any visually significant alteration while maintaining good visual quality for virtually all types of binary images (possibly excluding dispersed-dot halftones). As usual, the security of the algorithm lies only on the secrecy of a secretor private-key. This paper also presents a variation of the proposed scheme that can locate the modified region with good spatial resolution. A possible application of the proposed technique is in Internet fax transmission, i.e. for legal authentication of documents routed outside the phone network.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A secure authentication watermarking for halftone and binary images

Authentication watermark is a hidden data inserted into an image that can be used to detect any accidental or malicious alteration in the image. In the literature, there are many authentication-watermarking techniques for continuous-tone images. However, quite a small number of secure authentication watermarking techniques are available for binary/halftone images. This paper proposes a simple s...

متن کامل

Marcas d'Água Frágeis de Autenticação para Imagens em Tonalidade Contínua e Esteganografia para Imagens Binárias e Meio-Tom

Watermark is an information-carrying signal embedded into digital data that can be extracted later to make some assertion about the data. Digital watermarks are usually classified as robust or fragile. Robust watermarks are designed to resist most image manipulating procedures and are used normally to attest the image ownership. Fragile watermarks are easily corrupted by any image processing pr...

متن کامل

New Public-Key Authentication Watermarking for JBIG2 Resistant to Parity Attacks

An authentication watermark is a hidden data inserted into an image that allows detecting any alteration made in the image. AWTs (Authentication Watermarking Techniques) normally make use of secretor public-key cryptographic cipher to compute the authentication signature of the image, and inserts it into the image itself. Many previous public-key AWTs for uncompressed binary images can be attac...

متن کامل

Secure Authentication Watermarking for Binary Images

Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authentication watermarking without making use of the solid cryptography theory and techniques. In a cryptography-based authentication watermarking, a message authentication code (or digital signature) of the whole image is computed ...

متن کامل

A Blind Watermarking Scheme for Binary Image Authentication

A blind fragile watermarking scheme for binary image authentication is proposed. In authentication watermarking a hidden data is inserted into an image in order to detect any alterations. In the proposed method, the host binary image is first divided into non-overlapping 2 2 sub-blocks. Then, for the last position in each of the blocks, the probability of bit occurrence, conditional to differen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004