Authentication of Grey Level Images using a Watermarking Scheme

International Journal of Computer Science and Engineering
© 2014 by SSRG - IJCSE Journal
Volume 1 Issue 1
Year of Publication : 2014
Authors : S.Balusamy

pdf
Citation:
MLA Style:

S.Balusamy, "Authentication of Grey Level Images using a Watermarking Scheme" SSRG International Journal of Computer Science and Engineering 1.1 (2014): 1-5.

APA Style:

S.Balusamy, (2014). Authentication of Grey Level Images using a Watermarking Scheme. SSRG International Journal of Computer Science and Engineering 1.1, 1-5.

Abstract:

A watermark is a hidden signal added to images that can be detected or extracted later to make some affirmation about the host image. This research proposes a novel digital watermarking scheme to detect fraudulent attacks on an authenticated image committed by a malicious hacker. The proposed method can become aware of any visually significant alteration while maintaining good visual quality. The image is divided into two regions. In the first region authentication signature is embedded. The Authentication signature is obtained by calculating the hash value of the pixels in the second region. In the proposed algorithm security lies on the secrecy of the hash function and the key. Only its owner can insert the correct watermark while any one may verify the authenticity through the corresponding key. XOR based hashing technique had been proposed to maintain the security of the image while transmission. A possible application of the proposed technique is secured transmission of images through network.

References:

[1]. P. S. L. M. Barreto, H. Y. Kim and V. Rijmen, “Toward a Secure Public-Key Blockwise Fragile Authentication Watermarking,”IEE Proc. Vision, Image and Signal Processing, vol. 149, no. 2,pp. 57-62, 2002. 
[2]. R. de Queiroz and P. Fleckenstein, “Object Modification for Data Embedding through Template Ranking,” Xerox Internal Document, 1999. 
[3] M. S. Fu and O. C. Au, “Data Hiding Watermarking for Halftone Images,” IEEE Trans. Image Processing, vol. 11, no. 4, pp.477- 484, 2002. 
[4] M. S. Fu and O. C. Au, “A Robust Public Watermark for HalftoneImages,” IEEE Int. Symp. Circuits and Systems, vol. 3, pp.639-642, 2002. 
[5] M. Holliman and N. Memon “Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes,” IEEE Trans. Image Processing, 2000, vol. 9. no. 3, pp. 432-441. 
[6] Chun-Shien Lu and Hong-Yuan Mark Liao, “Multipurpose Watermarking for Image Authentication and protection”, IEEE Transactions on Image Processing, Vol.10, 2001. 
[7] Bian Yang, Fan Gu and Xiamu Niu “Block Mean Vlaue Based Image Perceptual Hashing”, IEEE Proc. Intelligent Information Hiding and Multimedia Signal Processing, 2006. 
[8]Schyndel,R.G., Tirkel, A.Z., Osbome,C.F.,1994, A Digital Watermark, Proceedings of the IEEE International conference on Image processing, Austin, Texas, vol.2,pp.86-90. 
[9] Hae Yong Kim, Ricardo Lopesde Queiroz “Alteration Locating Authentication Watermark for binary Images” I.J. Cox et al. (Eds.): IWDW 2004, LNCS 3304, pp. 125–136, 2005.Springer- Verlag Berlin Heidelberg 2005.

Key Words:

XOR, fraudulent attacks, Authentication signature