TY - GEN
T1 - Toral fragile watermarking for image authentication with localization
AU - Yeh, Fu Hao
AU - Lee, Greg C.
PY - 2004
Y1 - 2004
N2 - In this paper, we present a novel fragile watermarking approach that can localize tampered areas and resist the counterfeiting attack. Our algorithm eliminates communication security problem by using calculation signature function to create message signature for each block. Toral automorphism is applied for resisting counterfeiting attack. In particular, an image is divided into several non-overlapping blocks and signatures of each block are spread into other blocks that are chosen by toral automorphism with embedding keys. The effectiveness of our scheme is provided in experiments.
AB - In this paper, we present a novel fragile watermarking approach that can localize tampered areas and resist the counterfeiting attack. Our algorithm eliminates communication security problem by using calculation signature function to create message signature for each block. Toral automorphism is applied for resisting counterfeiting attack. In particular, an image is divided into several non-overlapping blocks and signatures of each block are spread into other blocks that are chosen by toral automorphism with embedding keys. The effectiveness of our scheme is provided in experiments.
KW - Authentication
KW - Counterfeiting attack
KW - Digital watermarking
KW - Toral automorphism
UR - http://www.scopus.com/inward/record.url?scp=10444242454&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=10444242454&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:10444242454
SN - 088986442X
T3 - Sixth IASTED International Conference on Signal and Image Processing
SP - 47
EP - 52
BT - Sixth IASTED International Conference on Signal and Image Processing
A2 - Hamza, M.H.
T2 - Sixth IASTED International Conference on Signal and Image Processing
Y2 - 23 August 2004 through 25 August 2004
ER -