Toral fragile watermarking for image authentication with localization

Fu Hao Yeh*, Greg C. Lee

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we present a novel fragile watermarking approach that can localize tampered areas and resist the counterfeiting attack. Our algorithm eliminates communication security problem by using calculation signature function to create message signature for each block. Toral automorphism is applied for resisting counterfeiting attack. In particular, an image is divided into several non-overlapping blocks and signatures of each block are spread into other blocks that are chosen by toral automorphism with embedding keys. The effectiveness of our scheme is provided in experiments.

Original languageEnglish
Title of host publicationSixth IASTED International Conference on Signal and Image Processing
EditorsM.H. Hamza
Pages47-52
Number of pages6
Publication statusPublished - 2004
EventSixth IASTED International Conference on Signal and Image Processing - Honolulu, HI, United States
Duration: 2004 Aug 232004 Aug 25

Publication series

NameSixth IASTED International Conference on Signal and Image Processing

Other

OtherSixth IASTED International Conference on Signal and Image Processing
Country/TerritoryUnited States
CityHonolulu, HI
Period2004/08/232004/08/25

Keywords

  • Authentication
  • Counterfeiting attack
  • Digital watermarking
  • Toral automorphism

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Toral fragile watermarking for image authentication with localization'. Together they form a unique fingerprint.

Cite this