Paper
30 August 2002 Image authentication with a time-stamped signature of the image and secret key encryption
Ju-Yun Cheng, Long-Wen Chang
Author Affiliations +
Abstract
Most Watermarking in copyright protection is usually concentrated on how to=make the=watermark robust to resist= any intetional or unintentional attacks. They often do not consider how to resolve the rightful ownership if several= watermarks are detected.= In this paper,=we use the block wavelet transform that is included in the compression standard ? jpeg=2000=to= compute=coefficients.= The image=is partitioned into non-overlapped=blocks and then=each=block is decomposed=into 10= subbands. For each block, we find a list of significant wavelet coefficients to embed the watermark. Then, we use a= cryptography=algirithm=rc6 to select the coefficients=from=the=list of significant=wavelet=coefficients=for watwrmarking.= Finally,=we=embed=the watermark=in the=image.=The purpose of using=the encryption=algorithm=is=that=the watermarking= algorithm can be public while the wavelet coefficients for embedding the watermark can be known only through the= secrete key of the encryption algorithm.=
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ju-Yun Cheng and Long-Wen Chang "Image authentication with a time-stamped signature of the image and secret key encryption", Proc. SPIE 4925, Electronic Imaging and Multimedia Technology III, (30 August 2002); https://doi.org/10.1117/12.481573
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Lithium

Image encryption

Symmetric-key encryption

Electronic imaging

Multimedia

RELATED CONTENT


Back to Top