Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Symbol Dictionary Design for the JBIG2 Standard
DCC '00 Proceedings of the Conference on Data Compression
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 3 - Volume 3
Alteration-locating authentication watermarking for binary images
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Data hiding in binary image for authentication and annotation
IEEE Transactions on Multimedia
Dictionary design for text image compression with JBIG2
IEEE Transactions on Image Processing
Data hiding watermarking for halftone images
IEEE Transactions on Image Processing
IEEE Transactions on Circuits and Systems for Video Technology
Hybrid pixel-based data hiding and block-based watermarking for error-diffused halftone images
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.01 |
An authentication watermark is a hidden data inserted into an image that allows detecting any alteration made in the image. AWTs (Authentication Watermarking Techniques) normally make use of secret- or public-key cryptographic cipher to compute the authentication signature of the image, and inserts it into the image itself. Many previous public-key AWTs for uncompressed binary images can be attacked by an image adulterating technique named “parity attack.” JBIG2 is an international standard for compressing bi-level images (both lossy and lossless). The creation of secure AWTs for compressed binary images is an important practical problem. However, it seems that no AWT for JBIG2 resistant to parity attacks has ever been proposed. This paper proposes a new data-hiding method to embed information in the text region of JBIG2 files. Then, we use this technique to design a new AWT for JBIG2-encoded images resistant to parity attacks. Both the secret- and public-key versions of the proposed AWT are completely immune against parity attacks. Moreover, watermarked images are visually pleasant, without visible salt and pepper noise. Image authenticity verification can be performed in either JBIG2 file itself or in the binary image obtained by decoding the JBIG2 file.