IEEE Transactions on Computers
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
A Secure Data Hiding Scheme for Two-Color Images
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
VLSI Implementation of Visible Watermarking for a Secure Digital Still Camera Design
VLSID '04 Proceedings of the 17th International Conference on VLSI Design
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
FPGA based implementation of an invisible-robust image watermarking encoder
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
Hardware implementation perspectives of digital video watermarking algorithms
IEEE Transactions on Signal Processing
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving
IEEE Transactions on Multimedia
VLSI design of an efficient embedded zerotree wavelet coder with function of digital watermarking
IEEE Transactions on Consumer Electronics
Attacks on digital watermarks: classification, estimation based attacks, and benchmarks
IEEE Communications Magazine
Electronic marking and identification techniques to discourage document copying
IEEE Journal on Selected Areas in Communications
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Interword distance changes represented by sine waves for watermarking text images
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
In information security, the authentication and detection of tampering and forgery are of primary concern. Data hiding or watermarking for binary images authentication is a promising approach to alleviate these concerns. Even the use of a secret static key is not secured due to various attacks. To mitigate the damage of secret key exposure, key updating signature schemes can be used. Key updating is done using a one-way function. The one-way function used in this paper is the message-digest 5 (MD5) hash function. MD5 provide a unique relationship between the input and the output hash value. An additional string of data is appended with this hash value to represent the time elapsed and hence makes the key 140-bit long, which will vary dynamically. The objective is to develop real time, reliable and secure watermarking systems, which can be achieved through hardware implementations. In this paper, we present a hardware implementation of an invisible spatial domain image watermarking algorithm with dynamic key updating for binary image. The proposed architectures were modelled, simulated and synthesised in Xilinx ISE.