Robust authentication scheme for protecting copyrights of images and graphics

被引:21
作者
Chang, CC [1 ]
Hwang, KF
Hwang, MS
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chaiyi, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Wufeng, Taiwan
来源
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING | 2002年 / 149卷 / 01期
关键词
D O I
10.1049/ip-vis:20020372
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Watermarking techniques are primarily used for copyright protection. A simple and robust watermark-like digital authentication scheme is proposed. This work has two major merits. First, the watermark used in the proposed authentication scheme is the same type used in the original image, e.g. grey level images. Second, the proposed scheme meets the requirements for watermarking techniques. Illegal users cannot perceive and break the watermark signed from the original image. Furthermore, the signed watermark is robust against attacks by many image altering algorithms, such as filtering, lossy compression, rotation and scaling. The proposed scheme is not only suitable for ordinary natural images, but also for cartoon graphics.
引用
收藏
页码:43 / 50
页数:8
相关论文
共 24 条
[1]  
[Anonymous], 1996, SWITZERLAND
[2]  
Arrowsmith D.K., 1990, INTRO DYNAMICAL SYST
[3]  
BULDAS AP, 1998, P C ADV CRYPT CRYPTO, P486
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]   Watermarking as communications with side information [J].
Cox, IJ ;
Miller, ML ;
McKellips, AL .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1127-1141
[6]   Can invisible watermarks resolve rightful ownerships? [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, M .
STORAGE AND RETRIEVAL FOR IMAGE AND VIDEO DATABASES V, 1997, 3022 :310-321
[7]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586
[8]  
HABER S, 1997, P 4 ACM C COMP COMM, P28
[9]  
Haber S., 1991, J CRYPTOL, V3, P99, DOI [10.1007/BF00196791, DOI 10.1007/BF00196791]
[10]   Multimedia watermarking techniques [J].
Hartung, F ;
Kutter, M .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1079-1107