Asymmetric Cryptography as Subset of Digital Hologram Watermarking (original) (raw)

Content fragile watermarking based on a computer generated hologram coding technique

Journal of Optics A: Pure and Applied Optics, 2005

In this paper we present a content fragile watermarking based on a computer generated hologram coding technique. Content fragile watermarking techniques aim to prevent tampering and fraudulent use of modified images. A content fragile watermark monitors the integrity of the content of the image but not its numerical representation. Therefore, the watermark is designed so that the integrity is proven if the content of the image has not been tampered with. However, if parts of the image are replaced, the watermark information should indicate evidence of forgery. Using computer generated hologram watermarking, the embedded mark could be easily recovered by means of a Fourier transform. Due to this fact the host image can be tampered with and watermarked with the same holographic pattern. To avoid this possibility we have introduced an encryption method using a private key. The proposed technique is suitable for use for freelancers' photography authentication. It could be applied to colour images as well as to grey-scale ones. The proposed schema is based on the knowledge of the original mark from the authentication entity, to apply image correlation between this and the extracted one.

Holographic watermarking for authentication of cut images

Optics and Lasers in Engineering, 2011

A watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking can be used to authenticate parts of the original image. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography allows authenticating cuts of the original image, is the major novelty of this paper. The proposed methodology is characterized as an authentication technique, since it does not rely on the original image to decide whether the watermarked image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property).

A Blind Holographic Image Watermarking Algorithm based on Dual Transform Domains and Visual Cryptography

International Journal of Security and its Applications , 2014

In this paper, we propose a blind watermarking scheme based on dual transform domains of discrete wavelet transform and discrete fractional random transform. In order to achieve the robustness and security, we also use the visual secret sharing scheme to split the secret image into two shares and use hologram quantization to spread the watermark information and analyze the cover image detail. For the purpose of widely practical application, we use a QR code for the watermark information. The QR code is decomposed into two shares, the first share is generated by the random seed, and the second share is generated with the help of a secret image and the first share. Firstly, the two shares are respectively transformed into a hologram by using the hologram quantization, and then a discrete fractional random transform is applied to them. The cover image is decomposed by two-dimension discrete wavelet transform. The subband generated watermark then is embedded into the intermediate frequency components of the cover image. The watermark extraction process is the reverse of the embedding process. Because of the spectrum characteristic and tear-resistant of the hologram, the algorithm has good invisibility. The experimental results show that the proposed algorithm is effective and robust against JPEG loss compression, cropping, rotation, and noise.

A Zero-Watermarking Scheme Based on Spread Spectrum and Holography

Lecture Notes in Electrical Engineering , 2015

This paper proposes a zero-watermarking scheme based on spread spectrum and holography. The method makes no changes to cover images while embedding the owner information of images so as to achieve high transparency. Discrete Wavelet transform, matrix norm, and holography are used to generate the feature image in order. While Arnold transformation and spread spectrum technique are employed to disturb and spread the watermark. Finally, Visual Cryptography scheme is applied to generate a secret image by using a codebook. The experimental results show that the algorithm is effective and robust against most conventional attacks.

Construction and detection of digital holographic watermarks

Optics Communications, 2005

This study presents an optical watermarking scheme using a digital holographic technique. The digital holographic watermark is constructed by a modified Mach-Zehnder interferometric architecture and a constant-level embedding algorithm, and the watermark detection is optically implemented using VanderLugt 4-f correlator with a weighting matched filter. The detection procedure is a compromise between perceptual quality and correlation robustness, in which the weighting factor selection rule and optimal threshold for the watermarking scheme are given and analyzed. Additionally, the detected correlation is spatially separable and avoided interference from the cover image. Both analytical and experimental results are presented and discussed.

Review on Cryptography of Image Using Computer Generated Holography

Journal of Network and Information Security, 2019

Holography is the process of capturing three dimensional images by recording patterns of light wave reflection. It is interference of two coherent light sources, one being scattered from an object and another reference light being sent directly into the holographic plate. This interference pattern is then used in a 3D holographic display to view the holographic representation of the object. This is done by passing the same reference light through the interference pattern fringe in the 3D display. Computer Generated Holography (CGH) is a simulation technique to generate the same interference pattern without the object being present. Usually this is done by taking an image or a 3D representation of the object and using numerical techniques to simulate the interference pattern of the light field. CGH has many applications and one of them is image encryption and decryption. In this paper compare traditional and advance hologram methods.

Securing information by use of digital holography

Optics Letters, 2000

An information security method that uses a digital holographic technique is presented. An encrypted image is stored as a digital hologram. The decryption key is also stored as a digital hologram. The encrypted image can be electrically decrypted by use of the digital hologram of the key. This security technique provides secure storage and data transmission. Experimental results are presented to demonstrate the proposed method.

A New Watermarking Scheme, Robust Against JPEG Compression and Some Asynchronous Attacks Based on Hough Transform

2005

Because of the unavoidable need to Internet in data exchange and multimedia use, in addition to the expand of electronic commerce, digital watermarking has been presented as solution to the copy protection of multimedia against properties stealing. In the diffusion process, informations are subject to different malicious or unintended attacks. In the other hand, because of the need to reduce the amount of manipulated data, the jpeg lossy compression remains the more involuntary attack used with data manipulating. This paper proposes a novel method for image watermarking based on the parametric space of the mathematical Hough transform. This space is used as a transform domain to process the image and embed the watermark. Different attacks permitting to test the robustness of the proposed watermarking scheme are simulated by the STIRMARK tool. After different applied attacks, experimental results show that the proposed method is very robust against lossy compression, and some geometrical attacks without any need to use the transformed DCT or multi-resolution domains.

Cryptographic Copyright Protection for Digital Images Based on Watermarking Techniques

Theoretical Computer Science, 1999

In this paper 1 we present a new approach for the secure and robust copyright protection of digital images. We describe a system for generating digital watermarks and for trading watermarked images. The system is based on a new watermarking technique, which is robust against image transformation techniques such as compression, rotation, translation, scaling and cropping. It uses modulation of the magnitude components in Fourier space to emb e d a w atermark and an accompanying template and, during watermark extraction, reads a template in the log polar transform of the frequency domain. The template is used for analyzing scaling and rotation su ered by the watermarked stego-image. The detection of the watermarks is also possible without any need for the original cover-image. In addition, the system applies asymmetric cryptographic protocols for di erent purposes, namely embedding detecting the watermark and transferring watermarked data. The public key technique is applied for the construction of a one-way watermark embedding and the veri cation function to identify and prove the uniqueness of the watermark. Legal dispute resolution is supported for the multiple watermarking of a digital image without revealing the con dential keying information.

A Cryptographic and Watermarking Encryption Technique for Securing and Authentication of Digital Images

International Journal of Computer Applications, 2015

Identity management is crucial in cyberspace where infringement of one's privacy, copy right disputes, theft and other malicious activities are very rampant. There exists a need of ownership identification and authentication of digital images. In solving and contributing to this field, we proposed a cryptographic and watermarking encryption technique for securing and authentication of digital images for identity management. In our approach, we encrypt the data to be embedded into the image before embedding it to the image. We make sure we select a random position in the image based on an embedding key. We make sure the message to be embedded was converted into values that falls in between 0-255. This is to avoid it being detected using forensic or steganalytic software.