Phase-Signature Based Watermarking for Multimedia Authentication: Analysis and Design
نویسندگان
چکیده
In this work, we address phase-signature based digital image watermarking. The signature is extracted from the Fourier phase information of the digital media. It is then embedded in the Fourier magnitude spectrum. The detection and/or authentication is based on the well established area of phase-only filter based correlation techniques in the optics community. We propose to analyze the distortion coming out of the embedding process, model it, and eventually parameterize it so that optimal embedding can be done by trading off with other aspects of watermarking. It will be shown why permutation like functions facilitate the signature embedding process by minimizing the embedding degradation.
منابع مشابه
On the Design of Secure Multimedia Authentication_final.dvi
At present, the proposed authentication schemes can be classified into three categories. The first category is the watermarking authentication schemes in which the watermark is independent of the multimedia content. The second category is the signature-based authentication schemes in which the signature is generated by the multimedia content and is not embedded into the multimedia content. The ...
متن کاملWatermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection
Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملAnalysis and design of authentication watermarking
This paper focuses on the use of nested lattice codes for effective analysis and design of semi-fragile watermarking schemes for content authentication applications. We provide a design framework for digital watermarking which is semi-fragile to any form of acceptable distortions, random or deterministic, such that both objectives of robustness and fragility can be effectively controlled and ac...
متن کاملDigital Signature Scheme for Image
Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on th...
متن کامل