A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheme

Author(s):  
V. Lokanadham Naidu ◽  
K. Ramani ◽  
D. Ganesh ◽  
Sk. Munwar ◽  
P. Basha
Author(s):  
Padma T ◽  
Jayashree Nair

Hard mathematical problems having no polynomial time algorithms to determine a solution are seemly in design of secure cryptosystems. The proposed watermarking system used number theoretic concepts of the hard higher order Diophantine equations for image content authentication scheme with three major phases such as 1) Formation of Diophantine equation; 2) Generation and embedding of dual Watermarks; and 3) Image content authentication and verification of integrity. Quality of the watermarked images, robustness to compression and security are bench-marked with two peer schemes which used dual watermarks.


2014 ◽  
Vol 6 (3) ◽  
pp. 30-46
Author(s):  
Jia-Hong Li ◽  
Tzung-Her Chen ◽  
Wei-Bin Lee

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.


2011 ◽  
Vol 34 (5) ◽  
pp. 1557-1565 ◽  
Author(s):  
Guangjie Liu ◽  
Junwen Wang ◽  
Shiguo Lian ◽  
Zhiquan Wang

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 149515-149526 ◽  
Author(s):  
Chih-Cheng Chen ◽  
Chin-Chen Chang ◽  
Chia-Chen Lin ◽  
Guo-Dong Su

Author(s):  
Mona A. M. Fouad ◽  
Ahmed Mokhtar A. Mansour

Sign in / Sign up

Export Citation Format

Share Document