A secure authentication watermarking for halftone and binary images
✍ Scribed by Hae Yong Kim; Amir Afif
- Publisher
- John Wiley and Sons
- Year
- 2004
- Tongue
- English
- Weight
- 152 KB
- Volume
- 14
- Category
- Article
- ISSN
- 0899-9457
No coin nor oath required. For personal study only.
✦ Synopsis
Abstract
An authentication watermark is a hidden data inserted into an image that can be used to detect any accidental or malicious alteration in the image. Many authentication‐watermarking techniques for continuous‐tone images are described in the literature, but only a quite small number of secure authentication watermarking techniques are available for binary/halftone images. This article proposes a simple solution for inserting a secure authentication watermark in binary/halftone images. It consists of choosing a set of pseudo‐random pixels in the image, clearing them, computing the message authentication code (or the digital signature) of the now‐cleared image, and inserting the resulting code into the selected random pixels. Dispersed‐dot halftone images watermarked by the proposed technique present better visual quality than do watermarked generic binary images. However, in practice, the visual degradation is hardly noticeable in either case. The proposed technique seems to be the only binary/halftone watermarking scheme that can detect even a single pixel alteration in the host image. It can be used with secret‐key or public‐key ciphers. © 2004 Wiley Periodicals, Inc. Int J Imaging Syst Technol 14, 147–152, 2004; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/ima.20018
📜 SIMILAR VOLUMES
Nowadays, image authentication schemes are widely applied to ownership protection and tampering detection of digital images. In this paper, we propose an image ownership and tampering authentication scheme based on watermarking techniques, which is employed to protect the rightful ownership and dete
## Abstract In this paper, to automate broadcast monitoring, which is typified by the verification of the transmission of the material ID code of a commercial message (CM) or program, the authors propose a watermarking scheme without reference images, which does not require a reference image when t
The use of arithmetic coding for binary image compression achieves a high compression ratio while the running time remains rather slow. A composite modelling method presented in this paper reduces the size of the data to be coded by arithmetic coding. The method is to code the uniform areas with les
We propose and consider a secure printing system for the distributed printing of documents and images over the World Wide Web. The main feature of the system is that it allows previewing and printing of selected documents and images, where only a certain number of hardcopies can be generated based o