Toral fragile watermarking for image authentication with localization

Fu Hao Yeh, Greg C. Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we present a novel fragile watermarking approach that can localize tampered areas and resist the counterfeiting attack. Our algorithm eliminates communication security problem by using calculation signature function to create message signature for each block. Toral automorphism is applied for resisting counterfeiting attack. In particular, an image is divided into several non-overlapping blocks and signatures of each block are spread into other blocks that are chosen by toral automorphism with embedding keys. The effectiveness of our scheme is provided in experiments.

Original languageEnglish
Title of host publicationSixth IASTED International Conference on Signal and Image Processing
EditorsM.H. Hamza
Pages47-52
Number of pages6
Publication statusPublished - 2004 Dec 27
EventSixth IASTED International Conference on Signal and Image Processing - Honolulu, HI, United States
Duration: 2004 Aug 232004 Aug 25

Publication series

NameSixth IASTED International Conference on Signal and Image Processing

Other

OtherSixth IASTED International Conference on Signal and Image Processing
CountryUnited States
CityHonolulu, HI
Period04/8/2304/8/25

Keywords

  • Authentication
  • Counterfeiting attack
  • Digital watermarking
  • Toral automorphism

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Toral fragile watermarking for image authentication with localization'. Together they form a unique fingerprint.

  • Cite this

    Yeh, F. H., & Lee, G. C. (2004). Toral fragile watermarking for image authentication with localization. In M. H. Hamza (Ed.), Sixth IASTED International Conference on Signal and Image Processing (pp. 47-52). (Sixth IASTED International Conference on Signal and Image Processing).