Sung-Cheal Byun, Il Lo Lee, Taehwan Shin, Byung-Ha Ahn
{"title":"基于公钥的彩色图像水印认证","authors":"Sung-Cheal Byun, Il Lo Lee, Taehwan Shin, Byung-Ha Ahn","doi":"10.1109/ICME.2002.1035851","DOIUrl":null,"url":null,"abstract":"We present a watermarking scheme for color image authentication based on cryptography. The scheme shows that if even a single bit has been changed, the watermarked image is regarded as unauthentic. Moreover, the scheme indicates the specific locations where changes have been made. To increase the security, the scheme uses two keys for the permutation of the input of the hash function and for the encryption (decryption) of watermark bits during the watermark insertion and extraction procedures, respectively. Results show that our watermark is correctly extracted if there is no change of watermarked image. However, any change of a watermarked image results in no watermark. The pixel changes of the watermarked image are reflected in the extracted watermark, which indicates the attacked area.","PeriodicalId":90694,"journal":{"name":"Proceedings. IEEE International Conference on Multimedia and Expo","volume":"112 1","pages":"593-596 vol.1"},"PeriodicalIF":0.0000,"publicationDate":"2002-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"A public-key based watermarking for color image authentication\",\"authors\":\"Sung-Cheal Byun, Il Lo Lee, Taehwan Shin, Byung-Ha Ahn\",\"doi\":\"10.1109/ICME.2002.1035851\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a watermarking scheme for color image authentication based on cryptography. The scheme shows that if even a single bit has been changed, the watermarked image is regarded as unauthentic. Moreover, the scheme indicates the specific locations where changes have been made. To increase the security, the scheme uses two keys for the permutation of the input of the hash function and for the encryption (decryption) of watermark bits during the watermark insertion and extraction procedures, respectively. Results show that our watermark is correctly extracted if there is no change of watermarked image. However, any change of a watermarked image results in no watermark. The pixel changes of the watermarked image are reflected in the extracted watermark, which indicates the attacked area.\",\"PeriodicalId\":90694,\"journal\":{\"name\":\"Proceedings. IEEE International Conference on Multimedia and Expo\",\"volume\":\"112 1\",\"pages\":\"593-596 vol.1\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-11-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. IEEE International Conference on Multimedia and Expo\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICME.2002.1035851\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE International Conference on Multimedia and Expo","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICME.2002.1035851","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A public-key based watermarking for color image authentication
We present a watermarking scheme for color image authentication based on cryptography. The scheme shows that if even a single bit has been changed, the watermarked image is regarded as unauthentic. Moreover, the scheme indicates the specific locations where changes have been made. To increase the security, the scheme uses two keys for the permutation of the input of the hash function and for the encryption (decryption) of watermark bits during the watermark insertion and extraction procedures, respectively. Results show that our watermark is correctly extracted if there is no change of watermarked image. However, any change of a watermarked image results in no watermark. The pixel changes of the watermarked image are reflected in the extracted watermark, which indicates the attacked area.