Secure authentication watermarking for binary images

被引:17
作者
Kim, HY [1 ]
Afif, A [1 ]
机构
[1] Univ Sao Paulo, Escola Politecn, BR-05508900 Sao Paulo, SP, Brazil
来源
XVI BRAZILIAN SYMPOSIUM ON COMPUTER GRAPHICS AND IMAGE PROCESSING, PROCEEDINGS | 2003年
关键词
D O I
10.1109/SIBGRA.2003.1241009
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authentication watermarking without making use of the solid cryptography theory and techniques. In a cryptography-based authentication watermarking, a message authentication code (or digital signature) of the whole image is computed and the resulting code is inserted into the image itself. However, inserting the code alters the image and consequently its authentication code, invalidating the watermark. To avoid this problem, for gray-scale or color image, usually the least significant bits (LSBs) are cleared, the authentication code of the LSB-cleared image is computed and then the code is inserted into LSBs. Surely, one cannot perform the same procedure for binary images. This paper proposes a quite simple solution for inserting a secure authentication watermarking in dispersed-dot halftone images. This technique can also be applied to any kind of binary images (including clustered-dot halftones), though the visual quality is not as good as when applied to dispersed-dot halftones. The proposed technique can be used with both secret-key or public-key ciphers.
引用
收藏
页码:199 / 206
页数:8
相关论文
共 21 条
[1]  
[Anonymous], IEEE INT C MULT EXP
[2]  
BAHARAV Z, 1998, HPL9832
[3]  
BARRETO PSL, 1999, SIBGR BRAZ S COMP GR, P241
[4]   Toward secure public-key blockwise fragile authentication watermarking [J].
Barreto, PSLM ;
Kim, HY ;
Rijmen, V .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2002, 149 (02) :57-62
[5]   Data hiding watermarking for halftone images [J].
Fu, MS ;
Au, OC .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (04) :477-484
[6]  
Fu MS, 2000, INT CONF ACOUST SPEE, P2318, DOI 10.1109/ICASSP.2000.859304
[7]  
FU MS, 2001, IEEE INT C AC SPEECH
[8]  
FU MS, 2002, IEEE INT S CIRC SYST, V3, P639
[9]   Watermarking and copyright labeling of printed images [J].
Hel-Or, HZ .
JOURNAL OF ELECTRONIC IMAGING, 2001, 10 (03) :794-803
[10]   Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes [J].
Holliman, M ;
Memon, N .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (03) :432-441