Filters








1,889 Hits in 4.4 sec

A Fragile Watermarking Scheme Based CRC Checksum and Public Key Cryptosystem for RGB Color Image Authentication [chapter]

Nour El-Houda Golea
2012 Lecture Notes in Computer Science  
In this paper, we propose a novel fragile watermarking scheme based CRC checksum and public key cryptosystem for RGB color image authentication.  ...  These data, in particular the images should be protected from tampering. The solution is the use of fragile watermarking.  ...  We are grateful to Dr Redha BENZID and Dr Rachid SEGHIR for early stimulating discussion and for their valuable comments and suggestions which lead to substantial improvements of this paper.  ... 
doi:10.1007/978-3-642-31254-0_36 fatcat:rl43lqegyrfkblqawrjla5vzdq

Secure Sharing of Medical Information in Watermarked Image through Telemedicine using PKI Technique

Ishwarya V, Thamarai Selvan T
2014 International Journal of Computer Applications  
With the patient information the medical image is protected through Public key cryptography in a secure manner. Compared to the previous system, the proposed technique is more efficient.  ...  Digital watermarks are used to verify the authenticity of the carrier signal for the identity of the owners.  ...  For authentication and integrity, RSA is a potential method for medical images.  ... 
doi:10.5120/17658-8473 fatcat:u43aunla3nbhjkxjter4hvjgje

Attack Detection Through Image Adaptive Self Embedding Watermarking

S. Shefali, S. M. Deshpande, S. G. Tamhankar
2007 Zenodo  
Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images.  ...  Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image.  ...  Uniqueness of Authenticator Watermark Generation: Different values of k should produce distinct authenticator watermarks for the same host image X , to guarantee key-based security of a W . 3.  ... 
doi:10.5281/zenodo.1080775 fatcat:tddrsqxa5fhzbmkb4uq7pn5fgq

Embedded Semi-Fragile Signature Based Scheme For Ownership Identification And Color Image Authentication With Recovery

M. Hamad Hassan, S.A.M. Gilani
2008 Zenodo  
In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking.  ...  The color image is first transformed from RGB to YST color space exclusively designed for watermarking.  ...  Abstract-In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking.  ... 
doi:10.5281/zenodo.1073063 fatcat:wvddktt2izd3bklyxzb57llali

The security flaws in some authentication watermarking schemes

Yongdong Wu, Feng Bao, ChangSheng Xu
2003 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698)  
In this paper we analyze three authentication watermarking schemes and point out their security flaws. The first scheme is the color authentication scheme in [1].  ...  The scheme is not secure in the sense that as long as an attacker obtains one authenticated image, he is able to forge authentic images without the secret key.  ...  WONG'S AUTHENTICATION SCHEME Wong et. al [2] described two authentication watermarking schemes: a secret key scheme and a public key scheme.  ... 
doi:10.1109/icme.2003.1221661 dblp:conf/icmcs/WuBX03 fatcat:to5rptkcwzditb4x7llkpp3oaq

A Fragile Watermarking Scheme For Color Image Authentication

M. Hamad Hassan, S.A.M. Gilani
2008 Zenodo  
In this paper, a fragile watermarking scheme is proposed for color image specified object-s authentication.  ...  The T channel corresponds to the chrominance component of a color image andYS ÔèÑ T , therefore selected for embedding the watermark.  ...  In this paper we presented a fragile watermarking scheme, designed for color image particular object's authentication.  ... 
doi:10.5281/zenodo.1055236 fatcat:pf2jpk4ozbhmbckrj6g7byq2di

A Semi-Fragile Watermarking Scheme For Color Image Authentication

M. Hamad Hassan, S.A.M. Gilani
2008 Zenodo  
In this paper, a semi-fragile watermarking scheme is proposed for color image authentication.  ...  For watermark distribution 2DTorus Automorphism is implemented using a private key to have a secure mapping of blocks.  ...  The given color image is first transformed from RGB to YST color space suitable for watermarking based applications.  ... 
doi:10.5281/zenodo.1061778 fatcat:alz5rgnzw5bmblvb3ody5htkay

A Semi-Fragile Signature Based Scheme For Ownership Identification And Color Image Authentication

M. Hamad Hassan, S.A.M. Gilani
2008 Zenodo  
In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies.  ...  The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications.  ...  The color image is first transformed from RGB to YST color space, exclusively designed for watermarking based applications.  ... 
doi:10.5281/zenodo.1071412 fatcat:xhkau4iafzafra2rikkqgspywi

A new public-key authentication watermarking for binary document images resistant to parity attacks

Hae Yong Kim
2005 IEEE International Conference on Image Processing 2005  
Recent papers have proposed some cryptography-based AWTs for binary and halftone images, but none of them seems to be well-suited for public-key authentication of binary document images.  ...  Many of the previous public-key AWTs for binary images can be assaulted by "parity attacks."  ...  A cryptography-based AWT for dispersed-dot halftone images named AWST (Authentication Watermarking by Self Toggling) has been recently proposed [9] .  ... 
doi:10.1109/icip.2005.1530245 dblp:conf/icip/Kim05 fatcat:v3ql6cb7gbagnfcaqqizfvthyq

A Quantum Watermark Protocol

Wei-Wei Zhang, Fei Gao, Bin Liu, Heng-Yue Jia, Qiao-Yan Wen, Hui Chen
2012 International Journal of Theoretical Physics  
In this paper, a watermark strategy for quantum images is proposed based on flexible representation for quantum images (FRQI).  ...  It is impossible for anyone except the copyrighter to clear off or extract the watermark images.  ...  Conclusion In this paper, a watermarking algorithm for quantum images is proposed based on FRQI.  ... 
doi:10.1007/s10773-012-1354-9 fatcat:bd7t6mbhtbdjfesvodppl4tqqu

Pattern-Based Fragile Watermarking For Color Images

Kuo-Cheng Liu
2010 Zenodo  
Publication in the conference proceedings of EUSIPCO, Aalborg, Denmark, 2010  ...  [6] presented the block-wise and content-based watermarking method for image authentication and recovery.  ...  However, a few attempts have been made to color image authentication. The color image watermarking schemes for authentication that have been relatively developed can be found in [9] - [12] .  ... 
doi:10.5281/zenodo.42117 fatcat:7d2mqsc3qje4dmal3owy2arxbe

Methods for image authentication: a survey

Adil Haouzia, Rita Noumeir
2007 Multimedia tools and applications  
The aim of this paper is to present a survey and a comparison of emerging techniques for image authentication.  ...  Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications.  ...  Public key systems, also called asymmetric systems, use a pair of keys: a public key and a private key.  ... 
doi:10.1007/s11042-007-0154-3 fatcat:wwtvlpeyjnck3pj5gcpxakvhfq

Security on Fragile and Semi-fragile Watermarks Authentication

Shilpi Saha, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay
2010 International Journal of Computer Applications  
Ensuring digital image security has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication.  ...  Here we have identified the attacks which frequently attacks some very well known fragile and semifragile watermarking techniques.. General Terms Security, Watermarking and Authentication.  ...  The watermarking is done for each block separately. Wong described two versions of this algorithm: private key and public key versions.  ... 
doi:10.5120/721-1013 fatcat:7c646ajmbjgnvn7njhyn26hhfu

Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images

Y. Zhao, P. Campisi, D. Kundur
2004 IEEE Transactions on Image Processing  
This paper proposes an approach for the combined image authentication and compression of color images by making use of a digital watermarking and data hiding framework.  ...  The digital watermark is comprised of two components: a soft-authenticator watermark for authentication and tamper assessment of the given image, and a chrominance watermark employed to improve the efficiency  ...  or intentional distortions in the CH image distribution chain), using the secret key (4) 5) The recovery function, , which employs for authentication and color recovery of the image (5) where is a key  ... 
doi:10.1109/tip.2003.821552 pmid:15376933 fatcat:hywpl3o72nhtblong43yqjlu24

Cryptanalysis of the Yeung–Mintzer fragile watermarking technique

Miroslav Goljan
2002 Journal of Electronic Imaging (JEI)  
A number of authentication techniques based on digital watermarks have been proposed in the literature.  ...  The attack works without knowledge of the binary watermark inserted in the image, provided the attacker has access to a few images that have been watermarked with the same secret key (insertion function  ...  The former employs public key techniques to generate a signature for a message that can be verified by anyone having knowledge of the public key (for example, see [3] ).  ... 
doi:10.1117/1.1459449 fatcat:6gt4n6rpobe2jbb72epco3wuci
« Previous Showing results 1 — 15 out of 1,889 results