scispace - formally typeset
Search or ask a question

Web based image authentication using invisible Fragile watermark

01 May 2001-pp 31-34
TL;DR: A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Abstract: The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Citations
More filters
Proceedings ArticleDOI
12 Feb 2011
TL;DR: An efficient pixel-wise fragile watermarking scheme, based on ARA (Authentication Relational & Associative) bits, is proposed, which can be used for exactly tracing maliciously altered pixels in image authentication.
Abstract: Potential for exactly tracing maliciously altered pixels is currently desired in image authentication. This paper proposes an efficient pixel-wise fragile watermarking scheme, based on ARA (Authentication Relational & Associative) bits. In this scheme ARA bits are embedded as a watermark into the first three LSBs of each pixel of the host image. On the receiver end, by comparing the extracted LSBs and recalculated ARA bits, one can easily recognize the altered pixels of the host image.

10 citations


Cites background or methods from "Web based image authentication usin..."

  • ...INTRODUCTION With the growing need of multimedia technology the se­curity of multimedia information like audio, video, text and image have become a major concern....

    [...]

  • ...A block-wise frag­ile watermarking proposed by Hongjie ,et al. is standard technique, based on scramble encryption[5] in which the wa­termark calculated from a block, is arbitrarily distributed on the LSB of all pixels in the whole image....

    [...]

Proceedings ArticleDOI
26 Aug 2007
TL;DR: This proposed scheme could be applied for ownership protection, copy control, annotation and authentication of digital media, and is focused on authentication of handwritten signature.
Abstract: In this paper, we propose data hiding, extraction and handwritten signature authentication algorithms for binary images. Handwritten signature Image can be transmitted from source to target securely over network after processing the source image by using this proposed data hiding algorithm. According to the algorithm, size of the carrier image must be double (or more) the size of source image. If necessary then additional bytes or noise needed to be injected into carrier image to attain the required size. To do this, the header is updated by the new value (sum of original size of file and amount of noise). There are numerous biometric authentication methods also proposed. In this paper, we propose a novel and new alternative. Entire work can be divided into two phases- a. security on transmission; and b. Recognition and authentication. Our scheme supports the application environment and we strongly believe that "user authentication by statistical analysis" could be a solid platform for future research and study. This proposed scheme could be applied for ownership protection, copy control, annotation and authentication of digital media. This work is focused on authentication of handwritten signature.

8 citations


Cites background from "Web based image authentication usin..."

  • ...Once image is distributed to externally, client can access to authentication web page to get verification of image [ 6 ]....

    [...]

Journal ArticleDOI
TL;DR: The method proposed in this paper hides two target images behind one cover image thereby increasing the data hiding capacity greatly, and is also free from the constraint of size.
Abstract: In this paper, a new technique for hiding the data of images has been proposed. This method uses 3-dimentional discrete cosine transformation scheme, along with 2-dimentional discrete cosine transformation. The method proposed in this paper hides two target images behind one cover image thereby increasing the data hiding capacity greatly. For the cause of security only the final stego-image is sent over the network. This approach is also free from the constraint of size.

8 citations

Proceedings ArticleDOI
03 Jun 2008
TL;DR: A new Handwritten Signature Recognition Algorithm based on pixel-to-pixel relationship between Images that supports the application environment and could be a solid platform for future research and study based on statistics and probability theory.
Abstract: In this paper we propose a new Handwritten Signature Recognition Algorithm. The Algorithm is based on pixel-to-pixel relationship between Images. The Algorithms are based on extensive statistical analysis, Standard Deviation, variance and Theory of Cross-Correlation. This is an extension work of Handwritten Signature Identification. This Algorithm supports the application environment and we strongly believe that "User Recognition" could be a solid platform for future research and study based on statistics and probability theory.

6 citations


Cites methods from "Web based image authentication usin..."

  • ...Prior to these we have worked on Morphological Image Processing focused on Handwritten Signature Scaling, Thinning and extraction of area of interest (Handwritten Signature Area within an Image)....

    [...]

  • ...For Handwritten Signature Identification and Authentication - a forward propagation technique is used to authenticate of input image out of the available training images [3]....

    [...]

  • ...Handwritten Signature Recognition Algorithm (HSRA): Input : N-Training Image(s), 1-Test Image Output : Test Image, FIT or UNFIT Procedure HSRA() { 1....

    [...]

  • ...This is an extension work of Handwritten Signature Identification....

    [...]

  • ...This is an extension work of Handwritten Signature Recognition, that we have started a year back....

    [...]

Journal ArticleDOI
TL;DR: This proposed steganography technique which hides patient information inside medical images using a key dynamically generated by graph3 coloring and pixel count of cover image maintains reversibility that the original medical images can be losslessly restored after the extraction of data from stego medical image.
Abstract: Nowadays security of information became an important issue. So it is mandatory to preserve the security of data that need to be transmitted in telemedicine application for proper and cost effective diagnosis. Steganography plays an important role in telemedicine application by providing confidentiality and integrity. This paper proposes a steganography technique which hides patient information inside medical images using a key dynamically generated by graph3 coloring and pixel count of cover image. Steganography is done along with cryptography by encrypting the patient information using RSA algorithm to strengthen the level of security. This proposed method maintains reversibility that the original medical images can be losslessly restored after the extraction of data from stego medical image. Experimental results show that this novel method is more secure as compared to other information hiding methods against various parameters such as computational complexity in key generation by unauthorized person and quality measure of reversed image in terms of Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE).

6 citations

References
More filters
Journal ArticleDOI
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Abstract: Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to which the data must be immune to interception, modification, or removal by a third party. We explore both traditional and novel techniques for addressing the data-hiding process and evaluate these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.

3,037 citations

Proceedings ArticleDOI
13 Nov 1994
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Abstract: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation. This capability is envisaged to find application in image tagging, copyright enforcement, counterfeit protection, and controlled access. Two methods of implementation are discussed. The first is based on bit plane manipulation of the LSB, which offers easy and rapid decoding. The second method utilises linear addition of the water mark to the image data, and is more difficult to decode, offering inherent security. This linearity property also allows some image processing, such as averaging, to take place on the image, without corrupting the water mark beyond recovery. Either method is potentially compatible with JPEG and MPEG processing. >

1,407 citations

Journal ArticleDOI

1,220 citations

Journal ArticleDOI
TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Abstract: Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message's very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. Steganography and cryptography are cousins in the spycraft family: cryptography scrambles a message so it cannot be understood while steganography hides the message so it cannot be seen. In this article the authors discuss image files and how to hide information in them, and discuss results obtained from evaluating available steganographic software. They argue that steganography by itself does not ensure secrecy, but neither does simple encryption. If these methods are combined, however, stronger encryption methods result. If an encrypted message is intercepted, the interceptor knows the text is an encrypted message. But with steganography, the interceptor may not know that a hidden message even exists. For a brief look at how steganography evolved, there is included a sidebar titled "Steganography: Some History."

644 citations

Proceedings ArticleDOI
16 Sep 1996
TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.
Abstract: A methodology for designing content based digital signatures which can be used to authenticate images is presented. A continuous measure of authenticity is presented which forms the basis of this methodology. Using this methodology signature systems can be designed which allow certain types of image modification (e.g. lossy compression) but which prevent other types of manipulation. Some experience with content based signatures is also presented. The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented. This signature also allows smaller segments of the secured video to be verified as unmanipulated.

615 citations