Cart (Loading....) | Create Account
Close category search window
 

A novel public key self-embedding fragile watermarking technique for image authentication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Hassan, A.M. ; Inst. for Electron., Otto-von-Guericke-Univ., Magdeburg, Germany ; Hasan, Y. ; Al-Hamadi, A. ; Wahab, M.A.A.
more authors

Digital images are vulnerable to various malicious manipulations. So, effective techniques are demanded for assuring the integrity of image contents. In this paper, a public key self-embedding image authentication technique is proposed which can detect and localize alterations of the image contents and can restore the distorted regions. A doubly linked chain is used to embed block signature copies and two block codes into relatively distant blocks. Each block code can not only approximately rebuild a distorted block but also can, combined with another block code, rebuild the block with high quality. Moreover, the proposed technique uses a public key in the verification process that enables verification of the image authenticity without knowing the private key used in the embedding process. The experimental results show that the proposed technique is sensitive to pixel changes and provides secure embedding of the blockwise image signatures. Furthermore, it thwarts many attacks, specially the collage (also called vector quantization, blind copy, or pattern matching) attacks and can successively recover the image attacked areas.

Published in:

Image Processing (ICIP), 2009 16th IEEE International Conference on

Date of Conference:

7-10 Nov. 2009

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.