A Public Key Watermarking Scheme for Image Authentication
نویسنده
چکیده
Conventional digital signature schemes for image authentication encode the signature in a file separate from the original image, thus require extra bandwidth to transmit it. Watermarking techniques embed some information in the host image. In this paper, a public key based digital signature scheme for image authentication is proposed. The scheme extracts feature value from the pixels of the of the original image. This feature is used to compute the signature which is embedded into the DCT of the image as watermark, avoiding additional signature file. It is inspired by Wong’s Public Key Watermarking scheme which was later enhanced by Baretto. The watermarked image demonstrated high perceptual quality and robustness. It also proved to be robust against many common image processing operations and JPEG compression. The scheme not only can verify the authenticity and the integrity of images, but also can locate the illegal modifications. Keywordsblock based, digital signature, feature extraction, hash functio, jpeg, DCT
منابع مشابه
An improved hybrid image watermarking scheme in shearlet and wavelet domain
Watermarking is one of the best solutions for copyright protection and authentication of multimedia contents. In this paper a hybrid scheme is proposed using wavelet and shearlet transforms with singular value decomposition. For better security, Arnold map is used for encryption. Examining the results and comparing with other methods show that this hybrid proposed scheme with simultaneous utili...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملFRAGILE and SEMI - FRAGILE WATERMARKING TECHNIQUES for IMAGE AUTHENTICATION
Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The frag...
متن کاملContent based Public Key Watermarking Scheme for Image Verification and Authentication
A semi fragile, public key based digital signature scheme to verify and authenticate digital images is proposed. The scheme computes a content dependent feature value for each block of DCT coefficients of the original image. This feature is signed and then embedded into the selected DCT coefficients of the image as watermark. The technique aims to circumvent the cut and paste attacks by incorpo...
متن کاملA Commutative Encryption and Reversible Watermarking for Fingerprint Image
In this work, authors propose a novel scheme with commutative encryption and reversible watermarking for a fingerprint image. Due to commutative property one can embed and extract watermark in either plain or encrypted fingerprint image, irrespective of order in which encryption or watermarking is applied. The encryption and the watermarking keys are shared using secret key sharing mechanism. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014