Tamper-Proof Image Watermarking, Based on Existing Public Key Infrastructure
نویسندگان
چکیده
The paper describes methods for generating image watermark for asymmetric key based watermark embedding and detection scheme in wavelet domain. The proposed method combines DWT-based watermarking and the ability to verify watermark using reliable methods of asymmetric coding. The watermark scheme is developed to be directly incorporated into JPEG2000 image coding standard, while it can be used in existing image coding standards. In presented watermarking method the application of public key infrastructure is emphasized . We use PGP (Pretty Good Privacy) public key management scheme as the element for verification of sender’s identity and also place of storing and retrieval of watermark detection keys. The most public key watermarking schemes use new, independent and cryptologically unverified keys. The reuse existing key verification and exchange infrastructure provides us cryptologically strong and verified keys.
منابع مشابه
A New Scheme for Image Authentication Framework
The paper proposes a digital signature-based approach for image authentication, pixel-wise tamper localization and iterative restoration. Usage cases for semi-fragile watermarking and proposed digital signature are analyzed, the advantages of the digital signature method are presented. Integration with Public Key Infrastructure (PKI) is outlined and discussed.
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملOn watermarking in frequency domain
A wavelet-based image watermarking scheme is proposed, based on insertion of ‘logo’ image as watermark in mid-frequency domain. This new approach provides flexibility in determining the pixel to be watermarked and increases the data hiding capacity. It is easy to implement watermark embedding algorithm as well as the corresponding detection algorithm. The watermarking algorithm is tested under ...
متن کاملWatermarking Scheme Based on Multiple Chaotic Maps
a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
متن کاملLimitations Regarding Certificate Handling on Smart Cards
A public-key infrastructure (PKI) typically requires use of tamper-proof devices that can perform crypto computations and store highly sensitive data like private keys. Smart cards are the low cost devices that satisfy these requirements and, as a result, they can boost the wide deployment of a PKI. Yet certain limitations exist regarding the handling of certificates, one of the supporting mech...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Informatica, Lith. Acad. Sci.
دوره 16 شماره
صفحات -
تاریخ انتشار 2005