FRAGILE and SEMI - FRAGILE WATERMARKING TECHNIQUES for IMAGE AUTHENTICATION
نویسندگان
چکیده
Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The fragile watermarking shows the limits of its applicability, when secure transacting of digital content is required. In this case, the authentication algorithm should be able to distinguish incidental integrity maintaining distortions such as lossy compression from malicious manipulations. This has motivated further researches into semi-fragile watermarking. Two novel watermarking algorithms are proposed in this thesis, both robust to self-authenticating. The first algorithm is a fragile spatial parity-checking watermarking method that employs a publickey scheme for still image authentication and integrity verification. The use of the parity-checking scheme and the public-key encryption enables the localization of tampered areas and the authentication of the watermarked image respectevely. The second algorithm is a semi-fragile holographic watermarking system. The previous algorithm is a really powerfull system to be a fragile technique but still not usefull for secure transacting over the Internet. The holographic technique enables good perfomances against distortions and is still able to guarantee the authenticity and the integrity of digital images. The authenticity is achieved by a public-key encryption of the mark and the integrity is achieved by the holography introduced in this technique.
منابع مشابه
Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform
Semi-fragile image authentication based on watermarking has drawn extensive attention. However, conventional watermarking techniques introduce irreversible distortions to the host signals and thus may not be allowable in some applications such as medical and military imaging. Though some reversible fragile authentication algorithms had been developed, reversible semi-fragile authentication pres...
متن کاملReview on Semi-Fragile Watermarking Algorithms for Content Authentication of Digital Images
With the popularity of network and the continuous development of multimedia technology, saving of network bandwidth and copyright protection of multimedia content have gradually attracted people’s attention. The fragile watermark for integrity authentication of image data and protection of copyright has become a hotspot. In the storage and transmission process, image data must be compressed to ...
متن کاملRobust and Semi-fragile Watermarking Techniques for Image Content Protection
......................................................................................................................... 2 Acknowledgements ........................................................................................................ 3 1.0 Introduction .............................................................................................................. 4 1.1 Aims and Object...
متن کاملDigital Image Authentication: A Review
Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based digital image authentication (CBDIA) techniques and data-hiding-based digital image authentication (DHBDIA) techniques. This paper not only...
متن کاملSecurity on Fragile and Semi-fragile Watermarks Authentication
Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Ensuring digital image security has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The aim of this paper is to present an overview of some possibl...
متن کامل