scispace - formally typeset
Open Access

A Watermark for Image Integrity and Ownership Verification.

Ping Wah Wong
- pp 374-379
Reads0
Chats0
TLDR
The invisible authentication watermark inherits the security of a cryptographic hash fun tion, hence it is computationally infeasible for any user to confuse the image integrity or owners by forgery.
Abstract
We describe in this paper a watermarking scheme ownership verification and image authentication. Th authentication watermark is invisible, and has applic tions in trusted cameras, image transactions, legal ages, medical archiving, and others. This watermark conjunction with an appropriate digital key, can dete and localize any modifications to images. The wate mark inherits the security of a cryptographic hash fun tion, hence it is computationally infeasible for any una thorized user to confuse the image integrity or owners by forgery. We also describe using this invisible authe tication watermark to protect any visible watermarks.

read more

Citations
More filters
Journal ArticleDOI

Lossless data embedding--new paradigm in digital watermarking

TL;DR: This paper introduces a new paradigm for data embedding in images (lossless dataembedding) that has the property that the distortion due to embedding can be completely removed from the watermarked image after the embedded data has been extracted.
Journal ArticleDOI

Secret and public key image watermarking schemes for image authentication and ownership verification

TL;DR: A watermarking scheme for ownership verification and authentication that requires a user key during both the insertion and the extraction procedures, and which can detect any modification made to the image and indicate the specific locations that have been modified.
Journal ArticleDOI

Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes

TL;DR: It is shown that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack.
Proceedings ArticleDOI

A public key watermark for image verification and authentication

TL;DR: A public key watermarking algorithm for image integrity verification that uses a public key as in public key cryptography, and hence it can be performed by any person without the secure exchange of a secret key.
Proceedings ArticleDOI

Lossless data embedding for all image formats

TL;DR: In this article, the authors formulate two general methodologies for lossless embedding that can be applied to images as well as any other digital objects, including video, audio, and other structures with redundancy.
References
More filters
Journal ArticleDOI

Secure spread spectrum watermarking for multimedia

TL;DR: It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Proceedings ArticleDOI

An invisible watermarking technique for image verification

TL;DR: A new method for invisibly watermarking high-quality color and gray-scale images intended for use in image verification applications, where one is interested in knowing whether the content of an image has been altered since some earlier time, perhaps because of the act of a malicious party.
Journal ArticleDOI

The trustworthy digital camera: restoring credibility to the photographic image

TL;DR: The digital signature standard (DSS) as mentioned in this paper was proposed to authenticate electronic mail messages by using modern cryptographic techniques to prevent the explosion of very capable personal computers from driving up the incidence of doctored photographs being passed off as truth.
Proceedings ArticleDOI

Transparent robust image watermarking

TL;DR: A watermarking scheme to hide copyright information in an image by filtering a pseudo-noise sequence with a filter that approximates the frequency masking characteristics of the visual system to guarantee that the embedded watermark is invisible and to maximize the robustness of the hidden data.
Related Papers (5)