Computer Generated Hologram for SemiFragile Watermarking with Encrypted Images
نویسندگان
چکیده
The protection of the contents of digital products is referred to as content authentication. In some applications, to be able to authenticate a digital product could be extremely essential. For example, if a digital product is used as a piece of evidence in the court, its integrity could mean life or death of the accused. Generally, the problem of content authentication can be solved using semifragile digital watermarking techniques. Recently many authors have proposed Computer Generated Hologram Watermarking (CGHWatermarking) techniques. Starting from these studies, in this paper a semi-fragile Computer Generated Hologram coding technique is proposed, which is able to detect malicious tampering while tolerating some incidental distortions. The proposed technique uses as watermark an encrypted image, and it is well suitable for digital image authentication. Keywords—Asymmetric cryptography, Semi-Fragile watermarking, Image authentication, Hologram watermark, PublicKey Cryptography, RSA.
منابع مشابه
Content fragile watermarking based on a computer generated hologram coding technique
In this paper we present a content fragile watermarking based on a computer generated hologram coding technique. Content fragile watermarking techniques aim to prevent tampering and fraudulent use of modified images. A content fragile watermark monitors the integrity of the content of the image but not its numerical representation. Therefore, the watermark is designed so that the integrity is p...
متن کاملThree-dimensional Image Watermarking Using Fractional Fourier Transform
In this paper, we propose an optical image watermarking scheme using the fractional Fourier transform. A two-dimensional watermark is encrypted using a double random fractional order Fourier domain encoding technique. The encrypted image is watermarked into a three-dimensional intensity image reconstructed from a real in-line digital hologram. The watermark is recovered by applying the correspo...
متن کاملComparative evaluation of semifragile watermarking algorithms
Semifragile watermarking techniques aim to prevent tampering and fraudulent use of modified images. A semifragile watermark monitors the integrity of the content of the image but not its numerical representation. Therefore, the watermark is designed so that the integrity is proven if the content of the image has not been tampered with, despite some mild processing on the image. However, if part...
متن کاملHologram-based watermarking capable of surviving print-scan process.
We propose a watermarking scheme for hardcopy pictures based on computer-generated holography. A hologram of the watermark is produced using a conjugate-symmetric extension technique, and its spectrum is inserted into the discrete cosine transform domain of the image. Adjusting the watermark placement in a data array, a trade-off between transparency and robustness is achieved. Anticropping and...
متن کاملA stack-based chaotic algorithm for encryption of colored images
In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...
متن کامل