Methods for image authentication: a survey
Multimedia Tools and Applications
Textural features extraction for image integrity verification
International Journal of Electronic Security and Digital Forensics
Content-adaptive semi-fragile image authentication based on JPEG2000 compression
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
The effect of quality scalable image compression on robust watermarking
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Homomorphic signatures for digital photographs
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Scalable watermark extraction for real-time authentication of JPEG 2000 images
Journal of Real-Time Image Processing
Hi-index | 0.00 |
In this paper, we present a secure and robust content-based digital signature scheme for verifying the authenticity of JPEG2000 images quantitatively, in terms of a unique concept named lowest authenticable bit rates (LABR). Given a LABR, the authenticity of the watermarked JPEG2000 image will be protected as long as its final transcoded bit rate is not less than the LABR. The whole scheme, which is extended from the crypto data-based digital signature scheme, mainly comprises signature generation/verification, error correction coding (ECC) and watermark embedding/extracting. The invariant features, which are generated from fractionalized bit planes during the procedure of embedded block coding with optimized truncation in JPEG2000, are coded and signed by the sender's private key to generate one crypto signature (hundreds of bits only) per image, regardless of the image size. ECC is employed to tame the perturbations of extracted features caused by processes such as transcoding. Watermarking only serves to store the check information of ECC. The proposed solution can be efficiently incorporated into the JPEG2000 codec (Part 1) and is also compatible with Public Key Infrastructure. After detailing the proposed solution, system performance on security as well as robustness will be evaluated.