A secure authentication watermarking for halftone and binary images

نویسندگان

  • Hae Yong Kim
  • Amir Afif
چکیده

Authentication watermark is a hidden data inserted into an image that can be used to detect any accidental or malicious alteration in the image. In the literature, there are many authentication-watermarking techniques for continuous-tone images. However, quite a small number of secure authentication watermarking techniques are available for binary/halftone images. This paper proposes a simple solution for inserting a secure authentication watermark in binary/halftone images. It consists on choosing a set of pseudorandom pixels in the image, clearing them, computing the message authentication code (or the digital signature) of the random-pixels-cleared image, and inserting the resulting code into the selected random pixels. Dispersed-dot halftone images watermarked by the proposed technique present better visual quality than watermarked generic binary images. However, in practice, the size of the host image uses to be much larger than the size of the inserted code, and consequently the visual degradation is hardly noticeable in either case. The proposed technique seems to be the only binary/halftone watermarking scheme that can detect even a single pixel alteration in the host image. It can be used with secretkey or public-key ciphers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Authentication Watermarking for Binary Images

Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authentication watermarking without making use of the solid cryptography theory and techniques. In a cryptography-based authentication watermarking, a message authentication code (or digital signature) of the whole image is computed ...

متن کامل

A multi-bit robust watermark for halftone images

In many printer and publishing applications, it is desirable to embed data in halftone images for copyright control and authentication purposes. While intentional attacks on printed matters may not be likely, unintentional attacks such as cropping and distortion due to dirt or human writing/marking are likely. In this paper, we proposed a novel halftone image watermarking method to embed a robu...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

A Lossless Watermarking Scheme for Halftone Image Authentication

Nowadays, halftone images appear routinely in books, magazines, printer outputs, and fax documents. It is desirable to embed data in halftone images for copyright protection and content authentication. This paper proposes a novel watermarking scheme for halftone image authentication, exploiting image hash as a fragile watermark. After pixel blocking and ordering, a lookup table is constructed a...

متن کامل

A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents

1. Gel’fand, S., Pinsker, M.: Coding for channel with random parameters. Problems of Control and Information Theory 9 (1980) 19–31 2. Eggers, J., Su, J., Girod, B.: A blind watermarking scheme based on structured codebooks. In: Secure Images and Image Authentication, IEE Colloquium, London, UK (2000) 4/1–4/6 Conclusions and Future Work • Halftone quantization: it exploits the fact that there ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Int. J. Imaging Systems and Technology

دوره 14  شماره 

صفحات  -

تاریخ انتشار 2004