Computer Generated Hologram for SemiFragile Watermarking with Encrypted Images

نویسندگان

  • G. Schirripa Spagnolo
  • M. De Santis
چکیده

The protection of the contents of digital products is referred to as content authentication. In some applications, to be able to authenticate a digital product could be extremely essential. For example, if a digital product is used as a piece of evidence in the court, its integrity could mean life or death of the accused. Generally, the problem of content authentication can be solved using semifragile digital watermarking techniques. Recently many authors have proposed Computer Generated Hologram Watermarking (CGHWatermarking) techniques. Starting from these studies, in this paper a semi-fragile Computer Generated Hologram coding technique is proposed, which is able to detect malicious tampering while tolerating some incidental distortions. The proposed technique uses as watermark an encrypted image, and it is well suitable for digital image authentication. Keywords—Asymmetric cryptography, Semi-Fragile watermarking, Image authentication, Hologram watermark, PublicKey Cryptography, RSA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Content fragile watermarking based on a computer generated hologram coding technique

In this paper we present a content fragile watermarking based on a computer generated hologram coding technique. Content fragile watermarking techniques aim to prevent tampering and fraudulent use of modified images. A content fragile watermark monitors the integrity of the content of the image but not its numerical representation. Therefore, the watermark is designed so that the integrity is p...

متن کامل

Three-dimensional Image Watermarking Using Fractional Fourier Transform

In this paper, we propose an optical image watermarking scheme using the fractional Fourier transform. A two-dimensional watermark is encrypted using a double random fractional order Fourier domain encoding technique. The encrypted image is watermarked into a three-dimensional intensity image reconstructed from a real in-line digital hologram. The watermark is recovered by applying the correspo...

متن کامل

Comparative evaluation of semifragile watermarking algorithms

Semifragile watermarking techniques aim to prevent tampering and fraudulent use of modified images. A semifragile watermark monitors the integrity of the content of the image but not its numerical representation. Therefore, the watermark is designed so that the integrity is proven if the content of the image has not been tampered with, despite some mild processing on the image. However, if part...

متن کامل

Hologram-based watermarking capable of surviving print-scan process.

We propose a watermarking scheme for hardcopy pictures based on computer-generated holography. A hologram of the watermark is produced using a conjugate-symmetric extension technique, and its spectrum is inserted into the discrete cosine transform domain of the image. Adjusting the watermark placement in a data array, a trade-off between transparency and robustness is achieved. Anticropping and...

متن کامل

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012