{"title":"A New Integration Scheme of Robust and Fragile for Secured Digital Watermarking","authors":"Lin Zhang, F. Qian, Yi Gao, Yuesheng Zhu","doi":"10.1109/CCCM.2008.358","DOIUrl":null,"url":null,"abstract":"In this paper, a new integration scheme of robust and fragile for secured digital watermarking is developed and implemented. The proposed method uses symmetric encryption algorithm, error correcting code and random permutation to process the original watermark information, and then embeds it into the blue component of image in robust process. In fragile process, a session key and the red component of image are hashed, and then the hashed value is encrypted by using the receiverpsilas public key, finally the encrypted message is embedded into the least significant bit (LSB) of the image. Our results have shown that the proposed scheme can resist white noise, cropping, median filter and JPEG compressing distortions, and can be used for image verification and identity authentication.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCCM.2008.358","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In this paper, a new integration scheme of robust and fragile for secured digital watermarking is developed and implemented. The proposed method uses symmetric encryption algorithm, error correcting code and random permutation to process the original watermark information, and then embeds it into the blue component of image in robust process. In fragile process, a session key and the red component of image are hashed, and then the hashed value is encrypted by using the receiverpsilas public key, finally the encrypted message is embedded into the least significant bit (LSB) of the image. Our results have shown that the proposed scheme can resist white noise, cropping, median filter and JPEG compressing distortions, and can be used for image verification and identity authentication.