scispace - formally typeset
Search or ask a question

Web based image authentication using invisible Fragile watermark

01 May 2001-pp 31-34
TL;DR: A web based image authentication method based in digital watermarking can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Abstract: The demand of security is getting higher in these days due to easy reproduction of digitally created multimedia data. Digital watermark is the emerging technique to embed secret information into content for copyright protection and authentication. Watermark is embedded within an image that alteration and modification to the watermarked image can be detected in a fragile watermark system. Watermark detection is blind that does not require an original image and it is invisible to avoid revealing secret information to malicious attackers. A web based image authentication method based in digital watermarking is described in this paper. It can provide more controls to image owners and conveniences to clients who want to get authenticity of image by integrating benefits of using Internet to the watermark system.
Citations
More filters
Journal ArticleDOI
TL;DR: This paper aims to combine the features of watermarking, image encryption as well as image steganography to provide reliable and secure data transmission.
Abstract: Steganography, water marking and encryption are widely used in image processing and communication. A general practice is to use them independently or in combination of two - for e.g. data hiding with encryption or steganography alone. This paper aims to combine the features of watermarking, image encryption as well as image steganography to provide reliable and secure data transmission .The basics of data hiding and encryption are explained. The first step involves inserting the required watermark on the image at the optimum bit plane. The second step is to use an RSA hash to actually encrypt the image. The final step involves obtaining a cover image and hiding the encrypted image within this cover image. A set of metrics will be used for evaluation of the effectiveness of the digital water marking. The list includes Mean Squared Error, Peak Signal to Noise Ratio and Feature Similarity.

1 citations

Journal ArticleDOI
TL;DR: The proposed method is used to hide an image file entirely with in another image file keeping two considerations in mind, which are Size and Degree of Security.
Abstract: In this paper, a technique for hiding the data of images has been proposed. The proposed method is used to hide an image file entirely with in another image file keeping two considerations in mind, which are Size and Degree of Security. At the source, the image that is to be hidden (target image) is encoded within another image (cover image). Firstly, the cover image and the target image can be of any size, which will be adjusted by our resize function thereby, removing the size constraint. Secondly, for the security of transmission over network, only the final encrypted image i.e. cover image and target image is sent over the network. This image is easily decoded at the receiver end. Results are encouraging from practical point of view.

1 citations


Cites background from "Web based image authentication usin..."

  • ...Once image is distributed to externally, client can access to authentication web page to get verification of image [2]....

    [...]

Proceedings ArticleDOI
01 May 2016
TL;DR: This paper compares the performance of block based SVD watermarking scheme for both conventional and medical images.
Abstract: Medical Image Watermarking has been proposed as a solution to deal with the problems of integrity, authenticity, and confidentiality and communications secrecy of medical images over networked environments. Medical image watermarking schemes exploit crucial traits of the medical image but this is not so for conventional images. In this paper, we compare the performance of block based SVD watermarking scheme for both conventional and medical images.

1 citations


Cites background from "Web based image authentication usin..."

  • ...Other schemes [11] – [12] also provided for integrity and authenticity of medical images....

    [...]

Book ChapterDOI
01 Jan 2022
TL;DR: Digital watermarking is a part of data security which is utilized to secure data in every form of media, that is, digitally available as mentioned in this paper. But, the issue of copy right is generated due to the straightforward transmission of information on the web.
Abstract: Nowadays, digital media has become basic need of people just like they need paper media. Since the technology has enhanced so digital media requires assurance while moving through web or others mediums. Watermarking methods have been created to satisfy this necessity. Digital watermarking is the answer for every form of piracy related to digital media. In digital watermarking, mysterious data is inserted into the initial information in order to shield it from unlawful use of information. Digital watermarking can be differentiated based upon domains like spatial domain, frequency domain, and more. Watermarking is a part of data security which is utilized to secure data in every form of media, that is, digitally available. The issue of copy right is generated due to the straightforward transmission of information on the web. This paper displays an overview of various procedures on digital picture watermarking. The procedure of digital watermarking is working for increasing significance in the creation of secured web society. Digital watermarking is an answer for the information movement security from unlawful impedances.

1 citations

Journal Article
TL;DR: A new approach to hide credentials is proposed, which satisfies all requirements of common credentials and provides a higher security as well without affecting the credentials transferring efficiency and aims at attaining little storage space and high security.
Abstract: Credentials are useful in many applications. For example, automated trust negotiation can be attained through the exchange of credentials. However, credentials endure all kinds of attacks during the transport while credentials bring us a lot of benefits. At the same time, how to store credentials is still a key problem to manage trust management systems. Good credential-storage design can greatly reduce much overhead, such as easy to search credentials, less storage space, high application convenience and so on. In this paper, we propose a new approach to hide credentials, which satisfies all requirements of common credentials and provides a higher security as well without affecting the credentials transferring efficiency. It aims at attaining little storage space and high security.

Cites background from "Web based image authentication usin..."

  • ...The users can download their image-credentials at the specific URL or get it in his email based on his own choice....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: This work explores both traditional and novel techniques for addressing the data-hiding process and evaluates these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.
Abstract: Data hiding, a form of steganography, embeds data into digital media for the purpose of identification, annotation, and copyright. Several constraints affect this process: the quantity of data to be hidden, the need for invariance of these data under conditions where a "host" signal is subject to distortions, e.g., lossy compression, and the degree to which the data must be immune to interception, modification, or removal by a third party. We explore both traditional and novel techniques for addressing the data-hiding process and evaluate these techniques in light of three applications: copyright protection, tamper-proofing, and augmentation data embedding.

3,037 citations

Proceedings ArticleDOI
13 Nov 1994
TL;DR: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale, capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation.
Abstract: The paper discusses the feasibility of coding an "undetectable" digital water mark on a standard 512/spl times/512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation. This capability is envisaged to find application in image tagging, copyright enforcement, counterfeit protection, and controlled access. Two methods of implementation are discussed. The first is based on bit plane manipulation of the LSB, which offers easy and rapid decoding. The second method utilises linear addition of the water mark to the image data, and is more difficult to decode, offering inherent security. This linearity property also allows some image processing, such as averaging, to take place on the image, without corrupting the water mark beyond recovery. Either method is potentially compatible with JPEG and MPEG processing. >

1,407 citations

Journal ArticleDOI

1,220 citations

Journal ArticleDOI
TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Abstract: Steganography is the art of hiding information in ways that prevent the detection of hidden messages. It includes a vast array of secret communications methods that conceal the message's very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. Steganography and cryptography are cousins in the spycraft family: cryptography scrambles a message so it cannot be understood while steganography hides the message so it cannot be seen. In this article the authors discuss image files and how to hide information in them, and discuss results obtained from evaluating available steganographic software. They argue that steganography by itself does not ensure secrecy, but neither does simple encryption. If these methods are combined, however, stronger encryption methods result. If an encrypted message is intercepted, the interceptor knows the text is an encrypted message. But with steganography, the interceptor may not know that a hidden message even exists. For a brief look at how steganography evolved, there is included a sidebar titled "Steganography: Some History."

644 citations

Proceedings ArticleDOI
16 Sep 1996
TL;DR: The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented, which allows smaller segments of the secured video to be verified as unmanipulated.
Abstract: A methodology for designing content based digital signatures which can be used to authenticate images is presented. A continuous measure of authenticity is presented which forms the basis of this methodology. Using this methodology signature systems can be designed which allow certain types of image modification (e.g. lossy compression) but which prevent other types of manipulation. Some experience with content based signatures is also presented. The idea of signature based authentication is extended to video, and a system to generate signatures for video sequences is presented. This signature also allows smaller segments of the secured video to be verified as unmanipulated.

615 citations