Skip to main content

Value Combination Technique for Image Authentication

  • Conference paper
Advances in Multimedia Information Processing – PCM 2007 (PCM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4810))

Included in the following conference series:

Abstract

Value Combination Technique is proposed for a novel bitmap exact authentication. It combines the pixel values in an image block with the block position, and the combined values are used as the initial state of chaotic system to generate watermark. Furthermore, a general rule is given to analyze the reliability of algorithm, and another rule is presented to design an algorithm with high reliability in this paper. Then, a concrete algorithm illustrates our proposed authentication system. Extensive experiments show that this system can effectively resist such as feature extraction attack, vector quantization attack and so on, and be very sensitive to tamper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhu, B.B., Swanson, M.D., Tewfik, A.H.: When Seeing Isn’t Believing. IEEE Signal Processing Magazine 21(2), 40–49 (2004)

    Article  Google Scholar 

  2. Zhu, B.B., Swanson, M.D.: Multimedia authentication and watermarking. In: Feng, D., Siu, W.C. (eds.) Multimedia Information Retrieval and Management, pp. 148–177. Springer, Heidelberg (2003)

    Google Scholar 

  3. Albanesi, M.G., Ferretti, M., Guerrini, F.: A taxonomy for image authentication techniques and its application to the current state of the art. In: Proceedings of the 11th International Conference of Image Analysis, Palermo, Italy, pp. 535–540 (2001)

    Google Scholar 

  4. Wu, J.H, Lin, F.Z.: Image Authentication Based on Digital Watermarking. Chinese Journal of Computers 27(9), 1153–1160 (2004)

    MathSciNet  Google Scholar 

  5. Walton, S.: Image authentication for a slippery new age. Dr.Dobb’s Journal 20(4), 18–26 (1995)

    MathSciNet  Google Scholar 

  6. Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Processings of the IEEE International Conference on Image Processing, Santa Barbara, USA, pp. 680–683 (1997)

    Google Scholar 

  7. Bassali, H., Chhugani, J., Agarwal, S., Aggarwal, A., Dubey, P.: Compression tolerant watermarking for image verification. In: Proceedings of the IEEE International Conference on Image Processing, Vancouver, Canada, pp. 430–433 (2000)

    Google Scholar 

  8. Lin, C.Y., Chang, S.F.: Semi-fragile watermarking for authenticating JPEG visual content. In: Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, USA, pp. 140–151 (2000)

    Google Scholar 

  9. Wu, J., Zhu, B., Li, S., Lin, F.: New attacks on SARI image authentication system. In: Proceedings of the SPIE. Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, vol. 5306, pp. 602–609 (2004)

    Google Scholar 

  10. Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10(10), 1593–1601 (2001)

    Article  MATH  Google Scholar 

  11. Li, S., Chen, G.: On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps. The Tutorial-Review section of International Journal of Bifurcation and Chaos 10(15), 3119–3151 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Horace H.-S. Ip Oscar C. Au Howard Leung Ming-Ting Sun Wei-Ying Ma Shi-Min Hu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, J., Liu, F., Wang, P., Wang, G. (2007). Value Combination Technique for Image Authentication. In: Ip, H.HS., Au, O.C., Leung, H., Sun, MT., Ma, WY., Hu, SM. (eds) Advances in Multimedia Information Processing – PCM 2007. PCM 2007. Lecture Notes in Computer Science, vol 4810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77255-2_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77255-2_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77254-5

  • Online ISBN: 978-3-540-77255-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics