A Public Key Watermark for Image Verification and Authentication

نویسنده

  • Ping Wah Wong
چکیده

We propose in this paper a public key watermarking algorithm for image integrity veri cation. This watermark is capable of detecting any change made to an image, including changes in pixel values and image size. This watermark is important for several imaging applications, including trusted camera, legal usage of images, medical archiving of images, news reporting, commercial image transaction, and others. In each of these applications, it is important to verify that the image has not been manipulated and that the image was originated by either a speci c camera or a speci c user. The veri cation (the watermark extraction) procedure uses a public key as in public key cryptography, and hence it can be performed by any person without the secure exchange of a secret key. This is very important in many applications (e.g., trusted camera, new reporting) where the exchange of a secret key is either not possible or undesirable.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Localized lossless authentication watermark (LAW)

A novel framework is proposed for lossless authentication watermarking of images which allows authentication and recovery of original images without any distortions. This overcomes a significant limitation of traditional authentication watermarks that irreversibly alter image data in the process of watermarking and authenticate the watermarked image rather than the original. In particular, auth...

متن کامل

A New Semi-fragile Image Authentication Framework Combining Ecc and Pki Infrastructures

This paper presents a new semi-fragile framework aiming at extending public key signature scheme from message level to content level. The content signing procedure includes signature generation and watermark embedding while the content authentication procedure includes watermark extraction and signature verification. One main unique contribution is the novel use of error correction coding (ECC)...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

Digital Signatures Based on Invertible Watermarks for Video Authentication

For verification and authentication of the video material and recovery of the original video several security mechanisms are required. The security techniques to realize this solution are introduced in [1]: 1. The verification of the integrity is verified by hash functions. 2. Authenticity is verified by digital signatures using asymmetric cryptography and hash functions. The introduced scheme ...

متن کامل

Fingerprint Minutiae Protection Using Two Watermarks

This paper proposes an approach for embedding two watermarks into fingerprint images using the Discrete Cosine Transform (DCT) algorithm. The main aim of the proposed algorithm is to add more authentication factors based on the watermark messages and to protect the ownership of the fingerprint image. Since the information used for identification or verification of a fingerprint image mainly lie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998