scholarly journals Modified LSB Watermarking for Image Authentication

Author(s):  
R. AARTHI ◽  
V. JAGANYA ◽  
S. POONKUNTRAN

This paper mainly aims at developing an authentication scheme for digital images. The LSB scheme is chosen base for our proposed work. Through literature survey it is found that conventional LSB scheme provides low embedding rat low distortion and is irreversible. Because of its irreversibility, the conventional LSB scheme cannot be used for critic applications where reversibility is mandatory. Through this literature survey, we learnt that this conventional LSB scheme us only one bit in every pixel for embedding. Our proposed scheme presents a modified LSB embedding strategy that satisfies th reversibility and improves the embedding rate by using two bits in every pixel for embedding.

2014 ◽  
Vol 6 (3) ◽  
pp. 30-46
Author(s):  
Jia-Hong Li ◽  
Tzung-Her Chen ◽  
Wei-Bin Lee

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.


2005 ◽  
Vol 05 (01) ◽  
pp. 135-148 ◽  
Author(s):  
QIBIN SUN ◽  
SHUIMING YE ◽  
CHING-YUNG LIN ◽  
SHIH-FU CHANG

With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic signature scheme to make the digital signatures robust to these image degradations. Due to the unpredictable degradations, the pre-processing and block shuffling techniques are applied onto the image at the signing end to stabilize the feature extracted at the verification end. The proposed approach is compatible with traditional cryptographic signature scheme except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results.


2018 ◽  
pp. 2124-2138
Author(s):  
Priya Makarand Shelke ◽  
Rajesh Shardanand Prasad

Over past few years, we are the spectators of the evolution in the field of information technology, telecommunication and networking. Due to the advancement of smart phones, easy and inexpensive access to the internet and popularity of social networking, capture and use of digital images has increased drastically. Image processing techniques are getting developed at rapidly and at the same time easy to use image tampering soft-wares are also getting readily available. If tampered images are misused, big troubles having deep moral, ethical and lawful allegations may arise. Due to high potential of visual media and the ease in their capture, distribution and storage, we rarely find a field where digital visual data is not used. The value of image as evidence of event must be carefully assessed and it is a call for from different fields of applications. Therefore, in this age of fantasy, image authentication has become an issue of utmost importance.


2011 ◽  
Vol 34 (5) ◽  
pp. 1557-1565 ◽  
Author(s):  
Guangjie Liu ◽  
Junwen Wang ◽  
Shiguo Lian ◽  
Zhiquan Wang

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 149515-149526 ◽  
Author(s):  
Chih-Cheng Chen ◽  
Chin-Chen Chang ◽  
Chia-Chen Lin ◽  
Guo-Dong Su

Author(s):  
Mona A. M. Fouad ◽  
Ahmed Mokhtar A. Mansour

Sign in / Sign up

Export Citation Format

Share Document