Abstract
Value Combination Technique is proposed for a novel bitmap exact authentication. It combines the pixel values in an image block with the block position, and the combined values are used as the initial state of chaotic system to generate watermark. Furthermore, a general rule is given to analyze the reliability of algorithm, and another rule is presented to design an algorithm with high reliability in this paper. Then, a concrete algorithm illustrates our proposed authentication system. Extensive experiments show that this system can effectively resist such as feature extraction attack, vector quantization attack and so on, and be very sensitive to tamper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhu, B.B., Swanson, M.D., Tewfik, A.H.: When Seeing Isn’t Believing. IEEE Signal Processing Magazine 21(2), 40–49 (2004)
Zhu, B.B., Swanson, M.D.: Multimedia authentication and watermarking. In: Feng, D., Siu, W.C. (eds.) Multimedia Information Retrieval and Management, pp. 148–177. Springer, Heidelberg (2003)
Albanesi, M.G., Ferretti, M., Guerrini, F.: A taxonomy for image authentication techniques and its application to the current state of the art. In: Proceedings of the 11th International Conference of Image Analysis, Palermo, Italy, pp. 535–540 (2001)
Wu, J.H, Lin, F.Z.: Image Authentication Based on Digital Watermarking. Chinese Journal of Computers 27(9), 1153–1160 (2004)
Walton, S.: Image authentication for a slippery new age. Dr.Dobb’s Journal 20(4), 18–26 (1995)
Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Processings of the IEEE International Conference on Image Processing, Santa Barbara, USA, pp. 680–683 (1997)
Bassali, H., Chhugani, J., Agarwal, S., Aggarwal, A., Dubey, P.: Compression tolerant watermarking for image verification. In: Proceedings of the IEEE International Conference on Image Processing, Vancouver, Canada, pp. 430–433 (2000)
Lin, C.Y., Chang, S.F.: Semi-fragile watermarking for authenticating JPEG visual content. In: Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, USA, pp. 140–151 (2000)
Wu, J., Zhu, B., Li, S., Lin, F.: New attacks on SARI image authentication system. In: Proceedings of the SPIE. Security and Watermarking of Multimedia Contents VI, San Jose, California, USA, vol. 5306, pp. 602–609 (2004)
Wong, P., Memon, N.: Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10(10), 1593–1601 (2001)
Li, S., Chen, G.: On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps. The Tutorial-Review section of International Journal of Bifurcation and Chaos 10(15), 3119–3151 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, J., Liu, F., Wang, P., Wang, G. (2007). Value Combination Technique for Image Authentication. In: Ip, H.HS., Au, O.C., Leung, H., Sun, MT., Ma, WY., Hu, SM. (eds) Advances in Multimedia Information Processing – PCM 2007. PCM 2007. Lecture Notes in Computer Science, vol 4810. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77255-2_30
Download citation
DOI: https://doi.org/10.1007/978-3-540-77255-2_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77254-5
Online ISBN: 978-3-540-77255-2
eBook Packages: Computer ScienceComputer Science (R0)