Water Marking Research Papers - Academia.edu (original) (raw)
In this paper, we have proposed a novel feature-based fragile water-marking scheme for image authentication. The proposed technique extracts Feature Points (FP) by performing the Harris corner detector and used them as germs to decomposes... more
In this paper, we have proposed a novel feature-based fragile water-marking scheme for image authentication. The proposed technique extracts Feature Points (FP) by performing the Harris corner detector and used them as germs to decomposes the host image in segments using Voronoi Diagram (VD). The authen-tication of each segment is guaranteed by using the Cyclic Redundancy Check code (CRC). Then, the CRC encoding procedure is applied to each segment to generate the watermark. Voronoi decomposition is employed because it has a good retrieval performance compared to similar geometrical decomposition algorithms. The security aspect of our proposed method is achieved by using the public key crypto-system RSA (Rivest-Shamir-Adleman) to encrypt the FP. Experimental results demonstrate the efficiency of our approach in terms of im-perceptibility, the capability of detection of alterations, the capacity of embedding, and computation time. We have also prove the impact of VD decomposition on the quality of the watermarked image compared to block decomposition. The proposed method can be applicable in the case where the tamper detection is critical and only some regions of interest must be re-transmitted if they are corrupted , like in the case of medical images. An example of the application of our approach to medical image is briefly presented.
The digital signature and watermarking methods are used for image authentication. Digital signature encodes the signature in a file separate from the original image. Cryptographic algorithms have suggested several advantages over the... more
The digital signature and watermarking methods are used for image authentication. Digital signature encodes the signature in a file separate from the original image. Cryptographic algorithms have suggested several advantages over the traditional encryption algorithms such as high security, speed, reasonable computational overheads and computational power. A digital watermark and signature method for image authentication using cryptography analysis is proposed. The digital signature created for the original image and apply watermark. Images are resized before transmission in the network. After digital signature and water marking an image, apply the encryption and decryption process to an image for the authentication. The encryption is used to securely transmit data in open networks for the encryption of an image using public key and decrypt that image using private key.
- by Editor IJRET
- •
- ECC, DICOM, Water Marking
Counterfeiting is a global problem that can have major social and economic consequences. The spread, number and kind of counterfeit goods has greatly increased in recent years: according to the study of Counterfeiting Intelligence Bureau... more
Counterfeiting is a global problem that can have major social and economic consequences. The spread, number and kind of counterfeit goods has greatly increased in recent years: according to the study of Counterfeiting Intelligence Bureau (CIB) of the International Chamber of Commerce (ICC), counterfeit Goods make up 5 to 7% of World Trade. In a recent update OECD has estimated in $250 billion in 2007 the worldwide value of international trade in counterfeit and pirated goods.
As a consequence, there is a urge in developing and adopting innovative anti-counterfeiting technologies able to ensure a real protection and/or traceability of a number of items, including, e.g., forensic documents, dan-gerous waste, strategic components (like microprocessors in automo-tive/aerospace fields, both civilian and military), pharmaceutical products, currency notes, identity/credit/debit cards, quality control, commercial/artistic objects.
Our Laboratory in ENEA has recently developed a new method to fight counterfeiting and to trace critical goods, based on our know-how in the fields of optics, laser, plasma and radiation-matter interaction. Our technology allows to vary the protection level in relation to the desired extent by properly increasing the complexity of the marking procedure. On the other side, the specific reading technique is straightforward using a dedicated apparatus.