Content-based image watermarking via public-key cryptosystems

被引:0
|
作者
Dai, H. K. [1 ]
Yeh, C. -T. [1 ]
机构
[1] Oklahoma State Univ, Dept Comp Sci, Stillwater, OK 74078 USA
关键词
image authentication and verification; watermarking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital watermarking is a technique to insert an information-carrying digital signature into a digital media so that the signature can be extracted for variety of purposes including ownership authentication and content verification. We examine the weaknesses against common watermarking attacks of blockwise independent and content-based watermarking algorithms for image integrity verification, and implement a new and more secure invisible fragile public-key watermarking algorithm for color or grayscale images that increases the message digest size from the proposed 64 to 128 bits using the same small-size blocks and maintaining high-quality watermarked images and accurate localization of image changes. Our watermarking technique is capable to detect any changes made to the image since the time it was stamped, any changes to the pixel values and also to the dimensions of the image will be automatically detected and localized. Our scheme consists of a watermark-insertion process that uses a private key to embed a watermark image into a cover image, and a watermark-extraction process that uses a public key to extract the watermark from the watermarked image. The embedded watermark can only be extracted by someone who has possession of a proper verification key.
引用
收藏
页码:937 / +
页数:3
相关论文
共 50 条
  • [1] A public-key based watermarking for color image authentication
    Byun, SC
    Lee, IL
    Shin, TH
    Ahn, BH
    IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I AND II, PROCEEDINGS, 2002, : 593 - 596
  • [2] A Multipurpose Public-key Cryptosystem Based Image Watermarking
    Ding, Yu-Wen
    Lin, Zi
    Wang, Li
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12584 - 12587
  • [3] Public-key cryptosystems based on cubic curves
    Koyama, Kenji
    Kuwakado, Hidenori
    Tsuruoka, Yukio
    NTT R and D, 1995, 44 (10): : 91 - 98
  • [4] Coalition public-key cryptosystems
    Anisimov A.V.
    Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12
  • [5] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [6] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [7] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154
  • [8] Embedded public-key cryptosystems via enhanced Montgomery multiplication
    Gastaldo, Paolo
    Parodi, Giovanni
    Picasso, Francesco
    Zunino, Rodolfo
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, PROCEEDINGS, VOLS 1-8, 2007, : 1820 - 1825
  • [9] Code-Based Public-Key Cryptosystems and Their Applications
    Kobara, Kazukuni
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55
  • [10] Security and reliability of LDPC based public-key cryptosystems
    Saad, D
    Skantzos, NS
    Kabashima, Y
    PROGRESS OF THEORETICAL PHYSICS SUPPLEMENT, 2005, (157): : 229 - 236