scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Bi-color nonlinear data embedding and extraction of handwritten signature

TL;DR: Handwritten Signature Image can be transmitted from source to target securely over network after processing the source image by using this proposed Data Hiding Algorithm.
Abstract: In this paper, we propose data hiding and extraction algorithms for binary images. Handwritten Signature Image can be transmitted from source to target securely over network after processing the source image by using this proposed Data Hiding Algorithm. According to the algorithm, size of the carrier image must be double (or more) the size of source image. If necessary then additional bytes or noise has to be injected into carrier image to attain the required size. To do this, the header is updated by the new value (sum of original size of file and amount of noise). This proposed technique can be applied for ownership protection, copy control, annotation and authentication of digital media. This work is specifically focused on protection and authentication of Handwritten Signature.
Citations
More filters
Book ChapterDOI
01 Jan 2020
TL;DR: In this paper, the authors presented web service for image authentication using the third party network by embedding an invisible watermark digital signature image into color image, where the client provided the handwritten signature and host image (bicolor image), which will send to server end.
Abstract: In this paper, we present web service for image authentication using the third party network by embedding an invisible watermark digital signature image into color image. The client will provide the handwritten signature and host image (bicolor image), which will send to server end. At server end, we embed user signature to host image which gains high-end security and authentication of user as well. Earlier attempts provided only stand-alone user interface, as well as the resultant image, produced distortion in image which is a serious threat to user reliability. This paper explores the idea of image protection mechanism by using data hiding. This approach also enables reliability by accessing authentication by user hand signature instead of getting ASCII and UNICODE formats which are serious threats for security. This paper opens a million ways for the intellectual property rights of user over multimedia (here image). The future work involved video authentication by encoding stream of images.

12 citations

Proceedings ArticleDOI
03 Jun 2008
TL;DR: The proposed technique for embedding a bi-color handwritten signature image of 70 times 50 pixels size in the color host image of 512 times 512 pixels shows very low visible distortions in the host image and algorithms provides high degree of robustness.
Abstract: In this paper, we propose a technique for embedding watermark bi-color image into color image. At the source, the handwritten signature image (bi-color image) is encoded at the end of the color image. Double folded security of handwritten signature can be achieved (over the untrusted network) by; first, the starting point of encoding the image data is depended on the size of the images; second, the starting point (byte location) of bi-color image encoding in the color image is stored within a four-byte block in encoded form. This four-byte location encoding is done by public key. At the target, first, the starting point of encoding bi-color image data (location) is decoded by private key and then, second, starts extracting the encoded bi-color image data from the color image. This technique requires knowledge of the color image for the recovery of the handwritten signature image. At the receiver, the algorithm reconstructs the original handwritten signature image. We examine the proposed technique for embedding a bi-color handwritten signature image of 70 times 50 pixels size in the color host image of 512 times 512 pixels. Simulation results show very low visible distortions in the host image and algorithms provides high degree of robustness.

3 citations


Cites background from "Bi-color nonlinear data embedding a..."

  • ...Debnath Bhattacharyya and Deepsikha Choudhury and Samir Kumar Bandyopadhyay have proposed [13] a data hiding method where the size of the carrier image must be double (or more) the size of source image....

    [...]

References
More filters
Journal ArticleDOI
Min Wu1, Bede Liu1
TL;DR: The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents, and presents analysis and discussions on robustness and security issues.
Abstract: This paper proposes a new method to embed data in binary images, including scanned text, figures, and signatures. The method manipulates "flippable" pixels to enforce specific block-based relationship in order to embed a significant amount of data without causing noticeable artifacts. Shuffling is applied before embedding to equalize the uneven embedding capacity from region to region. The hidden data can be extracted without using the original image, and can also be accurately extracted after high quality printing and scanning with the help of a few registration marks. The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents. The paper also presents analysis and discussions on robustness and security issues.

395 citations


"Bi-color nonlinear data embedding a..." refers methods in this paper

  • ...CARRIER_PIC is the image within which SOURCE_PIC is hidden to produce the modified image HIDDEN_PIC that is sent over the network....

    [...]

Journal ArticleDOI
01 Oct 2001
TL;DR: A novel algorithm which is suitable for VS visual data authentication is presented and the results obtained by applying it to test data are discussed.
Abstract: In automatic video surveillance (VS) systems, the issue of authenticating the video content is of primary importance. Given the ease with which digital images and videos can be manipulated, practically they do not have any value as legal proof, if the possibility of authenticating their content is not provided. In this paper, the problem of authenticating video surveillance image sequences is considered. After an introduction motivating the need for a watermarking-based authentication of VS sequences, a brief survey of the main watermarking-based authentication techniques is presented and the requirements that an authentication algorithm should satisfy for VS applications, are discussed. A novel algorithm which is suitable for VS visual data authentication is also presented and the results obtained by applying it to test data are discussed.

146 citations


"Bi-color nonlinear data embedding a..." refers background in this paper

  • ...Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Open File HIDDEN_PIC in read mode Open file RESTORED_PIC in write mode Initialize: Integer I = 1, byte RES_BYTE = 0, CH1 = 0, CH2=0 Declare three integer arrays PATTERN1, PATTERN2 & PATTERN3 of size 8 and initialize them to 0 While not eof() of HIDDEN_PIC…...

    [...]

Journal ArticleDOI
TL;DR: This work proposes practical realizations of this prescription for data hiding in images, with a view to hiding large volumes of data with low perceptual degradation, and shows that scalar quantization-based hiding incurs approximately only a 2-dB penalty in terms of resilience to attack.
Abstract: Information-theoretic analyses for data hiding prescribe embedding the hidden data in the choice of quantizer for the host data. We propose practical realizations of this prescription for data hiding in images, with a view to hiding large volumes of data with low perceptual degradation. The hidden data can be recovered reliably under attacks, such as compression and limited amounts of image tampering and image resizing. The three main findings are as follows. 1) In order to limit perceivable distortion while hiding large amounts of data, hiding schemes must use image-adaptive criteria in addition to statistical criteria based on information theory. 2) The use of local criteria to choose where to hide data can potentially cause desynchronization of the encoder and decoder. This synchronization problem is solved by the use of powerful, but simple-to-implement, erasures and errors correcting codes, which also provide robustness against a variety of attacks. 3) For simplicity, scalar quantization-based hiding is employed, even though information-theoretic guidelines prescribe vector quantization-based methods. However, an information-theoretic analysis for an idealized model is provided to show that scalar quantization-based hiding incurs approximately only a 2-dB penalty in terms of resilience to attack.

144 citations


"Bi-color nonlinear data embedding a..." refers methods in this paper

  • ...Thus when the entire HIDDEN_PIC is read, the original image file is restored back to produce the RESTORED_PIC file which is equivalent to the SOURCE_PIC file....

    [...]

Journal ArticleDOI
TL;DR: A reversiblevisible watermarking algorithm to satisfy a new application scenario where the visible watermark serves as a tag or ownership identifier, but can be completely removed to resume the original image data.
Abstract: In this paper, we propose a reversible visible watermarking algorithm to satisfy a new application scenario where the visible watermark serves as a tag or ownership identifier, but can be completely removed to resume the original image data. It includes two procedures: data hiding and visible watermark embedding. In order to losslessly recover both the watermark-covered and nonwatermark-covered image contents at the receiver end, the payload consists of two reconstruction data packets, one for recovering the watermark-covered region, and the other for the nonwatermark-covered region. The data hiding technique reversibly hides the payload in the image region not covered by the visible watermark. To satisfy the requirements of large capacity and high image quality, our hiding technique is based on data compression and uses a payload-adaptive scheme. It further adopts error diffusion for improving subjective image quality and arithmetic compression using a character-based model for increasing computational efficiency. The visible watermark is securely embedded based on a user-key-controlled embedding mechanism. The data hiding and the visible watermark embedding procedures are integrated into a secure watermarking system by a specially designed user key

107 citations


"Bi-color nonlinear data embedding a..." refers methods in this paper

  • ...Thus when the entire HIDDEN_PIC is read, the original image file is restored back to produce the RESTORED_PIC file which is equivalent to the SOURCE_PIC file....

    [...]

Proceedings ArticleDOI
27 Jun 2004
TL;DR: This work proposes a novel robust lossless data hiding technique, which does not generate salt-and-pepper noise, and has been successfully applied to many commonly used images, thus demonstrating its generality.
Abstract: Recently, among various data hiding techniques, a new subset, lossless data hiding, has drawn tremendous interest. Most existing lossless data hiding algorithms are, however, fragile in the sense that they can be defeated when compression or other small alteration is applied to the marked image. The method of C. De Vleeschouwer et al. (see IEEE Trans. Multimedia, vol.5, p.97-105, 2003) is the only existing semi-fragile lossless data hiding technique (also referred to as robust lossless data hiding), which is robust against high quality JPEG compression. We first point out that this technique has a fatal problem: salt-and-pepper noise caused by using modulo 256 addition. We then propose a novel robust lossless data hiding technique, which does not generate salt-and-pepper noise. This technique has been successfully applied to many commonly used images (including medical images, more than 1000 images in the CorelDRAW database, and JPEG2000 test images), thus demonstrating its generality. The experimental results show that the visual quality, payload and robustness are acceptable. In addition to medical and law enforcement fields, it has been applied to authenticate losslessly compressed JPEG2000 images.

86 citations


"Bi-color nonlinear data embedding a..." refers methods in this paper

  • ...Thus when the entire HIDDEN_PIC is read, the original image file is restored back to produce the RESTORED_PIC file which is equivalent to the SOURCE_PIC file....

    [...]