Computer Generated Hologram for SemiFragile Watermarking with Encrypted Images
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Computer Generated Hologram for SemiFragile Watermarking with Encrypted Images

Authors: G. Schirripa Spagnolo, M. De Santis

Abstract:

The protection of the contents of digital products is referred to as content authentication. In some applications, to be able to authenticate a digital product could be extremely essential. For example, if a digital product is used as a piece of evidence in the court, its integrity could mean life or death of the accused. Generally, the problem of content authentication can be solved using semifragile digital watermarking techniques. Recently many authors have proposed Computer Generated Hologram Watermarking (CGHWatermarking) techniques. Starting from these studies, in this paper a semi-fragile Computer Generated Hologram coding technique is proposed, which is able to detect malicious tampering while tolerating some incidental distortions. The proposed technique uses as watermark an encrypted image, and it is well suitable for digital image authentication.

Keywords: Asymmetric cryptography, Semi-Fragile watermarking, Image authentication, Hologram watermark, Public- Key Cryptography, RSA.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1071270

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1572

References:


[1] Y. Aoki, Watermarking Technique Using Computer-Generated Holograms, Electronics and Communications in Japan, Part 3, 84(1) (2001) 21-31.
[2] L. Croce Ferri, Visualization of 3D information with digital holography using laser printers, Computers & Graphics 25(2) (2001) 309-321.
[3] J. Dittmann, L. Croce Ferri, C. Vielhauer, Hologram Watermarks for Document Authentications, IEEE International Conference on Information Technology: Coding and Computing, IEEE Computer Society, Las Vegas, NV, USA, 2-4 April 2001, pp. 60-64.
[4] L. Croce Ferri, A. Mayerhöfer, M. Frank, C. Vielhauer, R. Steinmetz, Biometric Authentication for ID Cards with Hologram Watermarks, Proc. SPIE vol. 4675, Photonic West, Security and Watermarking of multimedia contents IV, San Jose, CA, 19-25 January 2002, pp. 629- 640.
[5] N. Takai and Y. Mifune, Digital watermarking by a holographic technique, Appl. Opt. 41(5) (2002) 865-873.
[6] G. Schirripa, C. Simonetti and L. Cozzella, Fragile Digital Watermarking by Synthetic Holograms, Proc. SPIE vol. 5615 European Symposium on Optics/Fotonics in security & Defence, London, UK, 25- 28 October 2004, pp. 173-182.
[7] G. Schirripa Spagnolo, C. Simonetti, L. Cozzella, Content fragile watermarking based on computer generated hologram coding technique, J. Opt. A: Pure Appl. Opt. 7(7) (2005) 333-342.
[8] M.M. Yeung, F.C. Mintzer, Invisible watermarking for image verification, J. Electronic Imaging 7(3) (1998) 578-591.
[9] P.W. Wong, N. Memon, Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification, IEEE Trans. Image Processing 10(10) (2001) 1593-1601.
[10] N. Memon, P.W. Wong, Protecting digital media content: Watermarks for copyrighting and authentication, Commun. ACM 41 (1998) 35-43.
[11] L.M. Marnel, C.G. Boncelet Jr., C.T. Retter, Spread spectrum image steganography, IEEE Trans. on Image Processing (1999) 1075-1083.
[12] E. T. Lin, E. J. Delp, A Review of Fragile Image Watermarks, Proc. of the Multimedia and Security Workshop (ACM Multimedia '99) Multimedia Contents, Orlando, FL, October 1999, Orlando, FL, pp. 25- 29.
[13] C. Rey, J.L. Dugelay, A Survey of Watermarking Algorithms for Image Authentication, EURASIP Journal on Applied Signal Processing 6 (2002) 613-621.
[14] W. R. Lee, Computer Generated Holograms: techniques and applications, Progress in Optics 16 (1974) 121-231.
[15] NIST FIPS 197 - Advanced Encryption Standard, 26 Nov 2001.
[16] W. Diffe, M. Hellman, New directions in cryptography, IEEE Trans. Information 22(6) (1976) 644-654.
[17] R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM 21(3) (1978) 120-126, 1978.