Fragile watermarking using finite field trigonometrical transforms

نویسندگان

  • Renato J. Cintra
  • Vassil S. Dimitrov
  • Hélio Magalhães de Oliveira
  • Ricardo M. Campello de Souza
چکیده

Fragile digital watermarking has been applied for authentication and alteration detection in images. Utilizing the cosine and Hartley transforms over finite fields, a new transform domain fragile watermarking scheme is introduced. A watermark is embedded into a host image via a blockwise application of two-dimensional finite field cosine or Hartley transforms. Additionally, the considered finite field transforms are adjusted to be number theoretic transforms, appropriate for error-free calculation. The employed technique can provide invisible fragile watermarking for authentication systems with tamper location capability. It is shown that the choice of the finite field characteristic is pivotal to obtain perceptually invisible watermarked images. It is also shown that the generated watermarked images can be used as publicly available signature data for authentication purposes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classical Wavelet Transforms over Finite Fields

This article introduces a systematic study for computational aspects of classical wavelet transforms over finite fields using tools from computational harmonic analysis and also theoretical linear algebra. We present a concrete formulation for the Frobenius norm of the classical wavelet transforms over finite fields. It is shown that each vector defined over a finite field can be represented as...

متن کامل

Fuzzy Transforms and Fragile Watermarking Tamper Detection on Coded Images

An original image is compressed with fuzzy transforms and is divided in images of sizes 2×2 on which we apply a known fragile watermarking process. A preprocessing phase is considered to determine the better compression rate for the coding process. We test this scheme in tamper detection analysis on a sample of images. The results are good in terms of accuracy for tamper detection with compress...

متن کامل

Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications

With the tremendous growth and use of digital cameras and video devices, the need to verify the collected digital content for law enforcement applications such as crime scene investigations and traffic violations, becomes paramount if they are to be used as evidence in courts. Semi-fragile watermarking has become increasingly important within the past few years as it can be used to verify the c...

متن کامل

VLSI architecture and chip for combined invisible robust and fragile watermarking

Research in digital watermarking is mature. Several software implementations of watermarking algorithms are described in the literature, but few attempts have been made to describe hardware implementations. The ultimate objective of the research presented in this paper was to develop low-power, highperformance, real-time, reliable and secure watermarking systems, which can be achieved through h...

متن کامل

Asymmetric Fragile Watermarking Using a Number Theoretic Transform

We propose an asymmetric fragile watermarking technique that uses a number theoretic transform (NTT). Signature data is extracted from a watermarked image by determining correlation functions that are computed using the NTT. The effectiveness of the proposed method is evaluated by simulated detection of altering. key words: number theoretic transform, asymmetric watermarking, fragile watermarki...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Sig. Proc.: Image Comm.

دوره 24  شماره 

صفحات  -

تاریخ انتشار 2009