𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A secure authentication watermarking for halftone and binary images

✍ Scribed by Hae Yong Kim; Amir Afif


Publisher
John Wiley and Sons
Year
2004
Tongue
English
Weight
152 KB
Volume
14
Category
Article
ISSN
0899-9457

No coin nor oath required. For personal study only.

✦ Synopsis


Abstract

An authentication watermark is a hidden data inserted into an image that can be used to detect any accidental or malicious alteration in the image. Many authentication‐watermarking techniques for continuous‐tone images are described in the literature, but only a quite small number of secure authentication watermarking techniques are available for binary/halftone images. This article proposes a simple solution for inserting a secure authentication watermark in binary/halftone images. It consists of choosing a set of pseudo‐random pixels in the image, clearing them, computing the message authentication code (or the digital signature) of the now‐cleared image, and inserting the resulting code into the selected random pixels. Dispersed‐dot halftone images watermarked by the proposed technique present better visual quality than do watermarked generic binary images. However, in practice, the visual degradation is hardly noticeable in either case. The proposed technique seems to be the only binary/halftone watermarking scheme that can detect even a single pixel alteration in the host image. It can be used with secret‐key or public‐key ciphers. © 2004 Wiley Periodicals, Inc. Int J Imaging Syst Technol 14, 147–152, 2004; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/ima.20018


📜 SIMILAR VOLUMES


A watermarking-based image ownership and
✍ Chin-Chen Chang; Yih-Shin Hu; Tzu-Chuen Lu 📂 Article 📅 2006 🏛 Elsevier Science 🌐 English ⚖ 368 KB

Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and dete

A watermarking scheme without reference
✍ Takashi Tachibana; Masaaki Fujiyoshi; Hitoshi Kiya 📂 Article 📅 2004 🏛 John Wiley and Sons 🌐 English ⚖ 887 KB

## Abstract In this paper, to automate broadcast monitoring, which is typified by the verification of the transmission of the material ID code of a commercial message (CM) or program, the authors propose a watermarking scheme without reference images, which does not require a reference image when t

A fast and efficient compression method
✍ Pasi Fränti 📂 Article 📅 1994 🏛 Elsevier Science 🌐 English ⚖ 815 KB

The use of arithmetic coding for binary image compression achieves a high compression ratio while the running time remains rather slow. A composite modelling method presented in this paper reduces the size of the data to be coded by arithmetic coding. The method is to code the uniform areas with les

A Web-Based Secure System for the Distri
✍ Ping Wah Wong; Daniel Tretter; Thomas Kite; Qian Lin; Hugh Nguyen 📂 Article 📅 1999 🏛 Elsevier Science 🌐 English ⚖ 292 KB

We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. The main feature of the system is that it allows previewing and printing of selected documents and images, where only a certain number of hardcopies can be generated based o