Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Fraud detection and self embedding
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 2)
SARI: self-authentication-and-recovery image watermarking system
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Self Embedding Watermarking Scheme Using Halftone Image
IEICE - Transactions on Information and Systems
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
IEEE Transactions on Image Processing
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Hierarchical watermarking for secure image authentication with localization
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Digital images are vulnerable to various malicious manipulations. So, effective techniques are demanded for assuring the integrity of image contents. In this paper, a public key self-embedding image authentication technique is proposed which can detect and localize alterations of the image contents and can restore the distorted regions. A doubly linked chain is used to embed block signature copies and two block codes into relatively distant blocks. Each block code can not only approximately rebuild a distorted block but also can, combined with another block code, rebuild the block with high quality. Moreover, the proposed technique uses a public key in the verification process that enables verification of the image authenticity without knowing the private key used in the embedding process. The experimental results show that the proposed technique is sensitive to pixel changes and provides secure embedding of the blockwise image signatures. Furthermore, it thwarts many attacks, specially the collage (also called vector quantization, blind copy, or pattern matching) attacks and can successively recover the image attacked areas.