Translator Disclaimer
16 September 2005 Quantization-based semi-fragile public-key watermarking for secure image authentication
Author Affiliations +
Abstract
Authentication watermarking approaches can be classified into two kinds: fragile and semi-fragile. In contrast to the latter one, fragile watermarking does not tolerate modifications of any single bit of the watermarked data. Since the transmission of digital data often requires lossy compression, an authentication system should accept non-malicious modifications such as JPEG compression. Semi-fragile techniques aim to discriminate malicious manipulations from admissible manipulations. In our approach, we extract image content dependent information, which is hashed afterwards and encrypted using secure methods known from the classical cryptography. The image data is partitioned into nonoverlapping 4x4 pixel blocks in the spatial domain. The mean values of these blocks form n-dimensional vectors, which are quantized to the nearest lattice point neighbours. Based on the changed vector values, a hash is calculated and asymmetrically encrypted, resulting in a digital signature. Traditional dual subspace approaches divide the signal space into a region for signature generation and a region for signature embedding. To ensure the security of the whole image, we join the two subspaces. The vectors, where to embed the bits using quantization-based data hiding techniques, are predistorted and also used for the signature generation. Our scheme applies error correction coding to gain the robustness of the embedded signature to non-malicious distortions. A second quantization run finally embeds the signature.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Mathias Schlauweg, Dima Proefrock, Torsten Palfner, and Erika Mueller "Quantization-based semi-fragile public-key watermarking for secure image authentication", Proc. SPIE 5915, Mathematics of Data/Image Coding, Compression, and Encryption VIII, with Applications, 591506 (16 September 2005); https://doi.org/10.1117/12.614054
PROCEEDINGS
11 PAGES


SHARE
Advertisement
Advertisement
Back to Top