A CRYPTO SIGNATURE SCHEME FOR IMAGE AUTHENTICATION OVER WIRELESS CHANNEL

2005 ◽  
Vol 05 (01) ◽  
pp. 135-148 ◽  
Author(s):  
QIBIN SUN ◽  
SHUIMING YE ◽  
CHING-YUNG LIN ◽  
SHIH-FU CHANG

With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic signature scheme to make the digital signatures robust to these image degradations. Due to the unpredictable degradations, the pre-processing and block shuffling techniques are applied onto the image at the signing end to stabilize the feature extracted at the verification end. The proposed approach is compatible with traditional cryptographic signature scheme except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results.

Author(s):  
Siva Charan Muraharirao ◽  
Manik Lal Das

Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit (LSB) is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security services. On the other hand, digital signature-based image authentication provides better security, but with added computational cost in comparison with LSB approach. Furthermore, digital signature-based authentication approach requires managing public key infrastructure. Considering security weakness of LSB-based approach and cost overhead of public key based approach, the authors present a digital image authentication scheme using LSB and message authentication codes (MAC). The MAC-based approach for authenticating digital image is secure and efficient approach without public key management overhead. The authors also provide experimental results of the proposed scheme using MATLAB. The experimental results show that the proposed scheme is efficient and secure in comparisons with other schemes.


Author(s):  
N.R. BRINTA ◽  
P.R. BIPIN

This paper presents a blind watermarking algorithm for digital images based on contourlet transform. After Contourlet transform, original image is decomposed into a series of multiscale, local and directional sub images. Each blocks of Arnold transformed watermark image, is embedded into suitable blocks of low pass coefficients of the contourlet transformed original image. Watermark is embedded using module arithmetic and odd-even quantization. The retrieving watermark algorithm is a blind detecting process, and it does not need original image. The experimental results show that the proposed watermarking algorithm is able to resist attacks, such as JPEG compression, noising, cropping and other attacks, and the watermarking is invisible and robust.


Author(s):  
Minh Thanh Tạ

This paper proposes a new watermarking method for digital image by composing the DWT-QIM based embedding with visual secret sharing (VSS) method. Firstly, the watermark image is separated into $n$ shares by using the $k-out-of-n$ method, called $(k,n)$ visual secret sharing. One of share is employed in order to embed into the original image for copyright protection. Another $(n-1)$ of shares are registered with Vietnam Copyright Department. When the dispute happens, the verifier can extract the watermark information from the watermarked image, then, decode it with $(k-1)$ shares chosen from $(n-1)$ shares to achieve the copyright information. Our experimental results show that our proposed method works efficiently on the digital images.


2011 ◽  
Vol 3 (4) ◽  
pp. 42-53 ◽  
Author(s):  
Chun-Ning Yang ◽  
Zhe-Ming Lu

This paper presents a novel image watermarking scheme utilizing Block Truncation Coding (BTC). This scheme uses BTC to guide the watermark embedding and extraction processes. During the embedding process, the original cover image is first partitioned into non-overlapping 4×4 blocks. Then, BTC is performed on each block to obtain its BTC bitplane, and the number of ‘1’s in the bitplane is counted. If the watermark bit to be embedded is ‘1’ and the number of ‘1’s is odd, or the watermark bit to be embedded is ‘0’ and the number of ‘1’s is even, then no change is made. Otherwise, by changing at most three pixels in the original image block, the number of ‘1’s (or ‘0’s) in the renewed bitplane are forced to be odd for the watermark bit ‘1’ or to be even for the watermark bit ‘0’. During the extraction process, BTC is first performed on each block to obtain its bitplane. If the number of ‘1’s in the bitplane is odd, then the embedded watermark bit is ‘1’. Otherwise, the embedded watermark bit is ‘0’. The experimental results show that the proposed watermarking method is semi-fragile except for the changes in brightness and contrast; therefore, the proposed method can be used for image authentication.


Author(s):  
TIEGANG GAO ◽  
QIAOLUN GU

Nowadays, digital watermarking algorithms are widely applied to ownership protection and tampering detection of digital images. In this paper, a new reversible watermarking algorithm based on wavelet lifting scheme is proposed. In the algorithm, the image is firstly divided into some no-overlapping blocks, and then the wavelet lifting scheme where on every block, is performed watermarking data is embedded into the image according to the attribute of the subband of every block. In order to guarantee the security of algorithm, chaotic system is used to shuffle the position of blocks. The interesting point and usefulness of the algorithm lies in the fact that the watermarked image can be exactly restored into the original image, and the watermarking is robust to cropping. The experimental results show the effectiveness of this scheme.


Sign in / Sign up

Export Citation Format

Share Document