A Color Image Authentication System

Article Preview

Abstract:

Image authentication has achieved a sharp attention now a day due to broad availability of internet services. Maldistribution and illegal copying of image volatiles the authenticity of image-ownership. In this regard the digital watermarking-based image authentication system is studied. A color image authentication system is proposed. This system converts a color image into a grayscale image, and divides the grayscale image into 8*8 small pieces. Each small piece is made into DCT transform and extracted low frequencies to form the watermark. Then, the original image uses LSB algorithm and hash algorithm in watermark image to form authentication code. The system makes the authentication code as watermark information to embed watermark. The system is made in experiment. The result shows the system has good imperceptibility.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2925-2929

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and Steganography, Second Edition, p.375, (2008).

DOI: 10.1016/b978-012372585-1.50014-0

Google Scholar

[2] C. -Y. Lin and S. -F. Chang, A robust image authentication method distinguishing JPEG compression from malicious manipulation, IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, p.153–168, Feb. (2001).

DOI: 10.1109/76.905982

Google Scholar

[3] P. W. Wong, A watermark for image integrity and ownership verification, in Proceedings of IS&T PIC Conference, (Portland, OR), May (1998).

Google Scholar

[4] P. W. Wong, A public key watermark for image verification and authentication, in Proceedings of ICIP, (Chicago, IL), October (1998).

Google Scholar

[5] P. W. Wong and N. Memon, Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification, IEEE Transactions on Image Processing, vol. 10, no. 10, p.1593–601, (2001).

DOI: 10.1109/83.951543

Google Scholar

[6] J. Fridrich and M. Goljan, Protection of Digital images Using Self-Embedding, Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, May 14, (1999).

Google Scholar

[7] J. Fridrich and M. Goljan. Images with Self-correcting Capabilities, in Proceedings of the IEEE International Conference on Image Processing, volume 3, p.792–796, (1999).

DOI: 10.1109/icip.1999.817228

Google Scholar

[8] K. Ke, T. Zhao & O. Li, A Restorative Image Authentication Scheme with Discrimination of Tampers on Image or Watermark, 4th International Conference on Multimedia and Ubiquitous Engi-neering(MUE), pp.1-5, (2010).

DOI: 10.1109/mue.2010.5575077

Google Scholar

[9] A. T. S. Ho, X. Zhu, J. Shen, and P. Marziliano, Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform, IEEE Transactions on Information Forensics and Secu-rity, Vol: 3, Issue: 3, pp: 567-569, (2008).

DOI: 10.1109/tifs.2008.926994

Google Scholar

[10] J. Xiao, Z. Ma, B. Lin, J. Su, Y. Wang, A semi-fragile watermarking distinguishing JPEG compression and gray-scale-transformation from malicious manipulation, IEEE Youth Conference on Information Computing and Telecommunications, (2010).

DOI: 10.1109/ycict.2010.5713080

Google Scholar

[11] D. Zou, Y.Q. Shi, Z. Ni, W. Su, A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform, IEEE Transactions on Circuits and Systems for Video Technology, (2006).

DOI: 10.1109/tcsvt.2006.881857

Google Scholar

[12] F. B. Coelho, J. S. Barbar, G. S. B. do Carmo, The Use of Watermark and Hash Function for the Authentication of Digital Images Mapped through the use of the Wavelet Transform, Second International Conference on Internet and Web Applications and Services, (2007).

DOI: 10.1109/iciw.2007.62

Google Scholar