IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
A visible watermarking algorithm based on the content and contrast aware (COCOA) technique
Journal of Visual Communication and Image Representation
Design and deployment of a digital forensics service platform for online videos
MiFor '09 Proceedings of the First ACM workshop on Multimedia in forensics
IVForensic: a digital forensics service platform for internet videos
MM '09 Proceedings of the 17th ACM international conference on Multimedia
IEEE Transactions on Circuits and Systems for Video Technology
A hypothesis testing approach to semifragile watermark-based authentication
IEEE Transactions on Information Forensics and Security
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
Technical Communication: Authentication and recovery of images using multiple watermarks
Computers and Electrical Engineering
A hybrid content-based image authentication scheme
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Information Sciences: an International Journal
Semi-fragile Zernike moment-based image water marking for authentication
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
NPT based video watermarking with non-overlapping block matching
Transactions on computational science XI
A novel watermarking scheme for H.264/AVC video authentication
Image Communication
Cryptographic link signatures for spectrum usage authentication in cognitive radio
Proceedings of the fourth ACM conference on Wireless network security
Protecting the content integrity of digital imagery with fidelity preservation
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Witsenhausen's counterexample and its links with multimedia security problems
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A novel reversible robust watermarking algorithm based on chaotic system
Digital Signal Processing
A Comparative Survey on Cryptology-Based Methodologies
International Journal of Information Security and Privacy
An improved sample projection approach for image watermarking
Digital Signal Processing
Hi-index | 0.00 |
This paper focuses on a coding approach for effective analysis and design of secure watermark-based multimedia authentication systems. We provide a design framework for semi-fragile watermark-based authentication such that both objectives of robustness and fragility are effectively controlled and achieved. Robustness and fragility are characterized as two types of authentication errors. The authentication embedding and verification structures of the semi-fragile schemes are derived and implemented using lattice codes to minimize these errors. Based on the specific security requirements of authentication, cryptographic techniques are incorporated to design a secure authentication code structure. Using nested lattice codes, a new approach, called MSB-LSB decomposition, is proposed which we show to be more secure than previous methods. Tradeoffs between authentication distortion and implementation efficiency of the secure authentication code are also investigated. Simulations of semi-fragile authentication methods on real images demonstrate the effectiveness of the MSB-LSB approach in simultaneously achieving security, robustness, and fragility objectives.