30 August 2002 Image authentication with a time-stamped signature of the image and secret key encryption
Author Affiliations +
Abstract
Most Watermarking in copyright protection is usually concentrated on how to=make the=watermark robust to resist= any intetional or unintentional attacks. They often do not consider how to resolve the rightful ownership if several= watermarks are detected.= In this paper,=we use the block wavelet transform that is included in the compression standard ? jpeg=2000=to= compute=coefficients.= The image=is partitioned into non-overlapped=blocks and then=each=block is decomposed=into 10= subbands. For each block, we find a list of significant wavelet coefficients to embed the watermark. Then, we use a= cryptography=algirithm=rc6 to select the coefficients=from=the=list of significant=wavelet=coefficients=for watwrmarking.= Finally,=we=embed=the watermark=in the=image.=The purpose of using=the encryption=algorithm=is=that=the watermarking= algorithm can be public while the wavelet coefficients for embedding the watermark can be known only through the= secrete key of the encryption algorithm.=
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ju-Yun Cheng, Long-Wen Chang, "Image authentication with a time-stamped signature of the image and secret key encryption", Proc. SPIE 4925, Electronic Imaging and Multimedia Technology III, (30 August 2002); doi: 10.1117/12.481573; https://doi.org/10.1117/12.481573
PROCEEDINGS
8 PAGES


SHARE
RELATED CONTENT

The role of classifiers in multimedia content management
Proceedings of SPIE (January 10 2003)
IFS-based image geometry transform
Proceedings of SPIE (November 29 2007)
Image retrieval using color and edge histograms
Proceedings of SPIE (November 29 2007)
Efficient cost-based scheduling for scalable media streaming
Proceedings of SPIE (January 29 2007)

Back to Top