A New Public-Key Algorithm for Watermarking of Digital Images

Author(s):  
Eberhard Stickel

Conventional photographs may easily be used in court as evidence. The complete negative may be inspected. Subsequent numbers are a reliable proof that sequences of pictures have been generated. Modifications are usually quickly detected without major technical efforts. This is not true anymore for digital images, since they may easily be manipulated. This poses a problem, for example, for surveillance cameras of automatic teller machines in financial institutions. Digital watermarking techniques have been proposed to address this problem. In this chapter, a new public-key watermarking system will be presented. In contrast to digital signatures and other public-key watermarking techniques, it is two-dimensional and, hence, especially well-suited for applications involving digital images.

2008 ◽  
pp. 1257-1266
Author(s):  
Eberhard Stickel

Conventional photographs may easily be used in court as evidence. The complete negative may be inspected. Subsequent numbers are a reliable proof that sequences of pictures have been generated. Modifications are usually quickly detected without major technical efforts. This is not true anymore for digital images, since they may easily be manipulated. This poses a problem, for example, for surveillance cameras of automatic teller machines in financial institutions. Digital watermarking techniques have been proposed to address this problem. In this chapter, a new public-key watermarking system will be presented. In contrast to digital signatures and other public-key watermarking techniques, it is two-dimensional and, hence, especially well-suited for applications involving digital images.


2021 ◽  
Vol 1897 (1) ◽  
pp. 012045
Author(s):  
Karrar Taher R. Aljamaly ◽  
Ruma Kareem K. Ajeena

Author(s):  
RANI SIROMONEY ◽  
K. G. SUBRAMANIAN ◽  
P. J. ABISHA

Language theoretic public key cryptosystems for strings and pictures are discussed. Two methods of constructing public key cryptosystems for the safe transmission or storage of chain code pictures are presented; the first one encrypts a chain code picture as a string and the second one as a two-dimensional array.


1989 ◽  
Vol 25 (1) ◽  
pp. 64-65
Author(s):  
V. Varadharajan

1990 ◽  
Vol 21 (1) ◽  
pp. 205-215
Author(s):  
SAAD M. KALlPHA ◽  
JAFAR WADI ABDUL SADA ◽  
HUSSAIN ALI HUSSAIN

2017 ◽  
Author(s):  
C. Bradford Biddle

On March 9, 1995, the Utah Digital Signature Act (the “Utah Act”) was signed into law.1 Complex and ambitious, the Utah Act is intended to promote the use of digital signatures on computer-based documents and to facilitate electronic commerce.2 The Utah Act implements an infrastructure in which computer users utilize “certification authorities,” online databases called repositories, and public-key encryption technology in order to “sign” electronic documents in a legally binding fashion. In addition to setting out a regulatory scheme designed to implement this infrastructure, the Utah Act provides certain digital signatures with legal status as valid signatures and addresses a variety of issues relating to the status of digitally-signed electronic documents in contract and evidence law.


Sign in / Sign up

Export Citation Format

Share Document