Open Access
A Watermark for Image Integrity and Ownership Verification.
Ping Wah Wong
- pp 374-379
Reads0
Chats0
TLDR
The invisible authentication watermark inherits the security of a cryptographic hash fun tion, hence it is computationally infeasible for any user to confuse the image integrity or owners by forgery.Abstract:
We describe in this paper a watermarking scheme ownership verification and image authentication. Th authentication watermark is invisible, and has applic tions in trusted cameras, image transactions, legal ages, medical archiving, and others. This watermark conjunction with an appropriate digital key, can dete and localize any modifications to images. The wate mark inherits the security of a cryptographic hash fun tion, hence it is computationally infeasible for any una thorized user to confuse the image integrity or owners by forgery. We also describe using this invisible authe tication watermark to protect any visible watermarks.read more
Citations
More filters
Journal ArticleDOI
Lossless data embedding--new paradigm in digital watermarking
TL;DR: This paper introduces a new paradigm for data embedding in images (lossless dataembedding) that has the property that the distortion due to embedding can be completely removed from the watermarked image after the embedded data has been extracted.
Journal ArticleDOI
Secret and public key image watermarking schemes for image authentication and ownership verification
Ping Wah Wong,Nasir Memon +1 more
TL;DR: A watermarking scheme for ownership verification and authentication that requires a user key during both the insertion and the extraction procedures, and which can detect any modification made to the image and indicate the specific locations that have been modified.
Journal ArticleDOI
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
M. Holliman,Nasir Memon +1 more
TL;DR: It is shown that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack.
Proceedings ArticleDOI
A public key watermark for image verification and authentication
TL;DR: A public key watermarking algorithm for image integrity verification that uses a public key as in public key cryptography, and hence it can be performed by any person without the secure exchange of a secret key.
Proceedings ArticleDOI
Lossless data embedding for all image formats
TL;DR: In this article, the authors formulate two general methodologies for lossless embedding that can be applied to images as well as any other digital objects, including video, audio, and other structures with redundancy.
References
More filters
Journal ArticleDOI
Secure spread spectrum watermarking for multimedia
TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Proceedings ArticleDOI
An invisible watermarking technique for image verification
TL;DR: A new method for invisibly watermarking high-quality color and gray-scale images intended for use in image verification applications, where one is interested in knowing whether the content of an image has been altered since some earlier time, perhaps because of the act of a malicious party.
Journal ArticleDOI
The trustworthy digital camera: restoring credibility to the photographic image
TL;DR: The digital signature standard (DSS) as mentioned in this paper was proposed to authenticate electronic mail messages by using modern cryptographic techniques to prevent the explosion of very capable personal computers from driving up the incidence of doctored photographs being passed off as truth.
Proceedings ArticleDOI
Transparent robust image watermarking
TL;DR: A watermarking scheme to hide copyright information in an image by filtering a pseudo-noise sequence with a filter that approximates the frequency masking characteristics of the visual system to guarantee that the embedded watermark is invisible and to maximize the robustness of the hidden data.