Image authentication and integrity verification via content-based watermarks and a public key cryptosystem

C. T. Li, D. C. Lou, T. H. Chen

Research output: Book chapter/Published conference paperConference paper

42 Citations (Scopus)

Abstract

A technique using the inherent feature map of the underlying image as the watermark is proposed in this work. First, the binary feature map is extracted as watermark and partitioned into blocks. Secondly, neighboring feature map block are blended and encrypted for insertion. On the receiver side, the feature map from the received image is extracted again and compared against the recovered watermark to verify the integrity and authenticity. In addition the capability of detecting geometric transformation, removal of original objects and addition of foreign objects, the proposed scheme is also capable of localizing tampering and detecting cropping without a priori knowledge about the image.

Original languageEnglish
Title of host publicationIEEE International Conference on Image Processing
Volume3
Publication statusPublished - 2000
EventInternational Conference on Image Processing (ICIP 2000) - Vancouver, BC, Canada
Duration: 10 Sep 200013 Sep 2000

Conference

ConferenceInternational Conference on Image Processing (ICIP 2000)
CountryCanada
CityVancouver, BC
Period10/09/0013/09/00

Fingerprint

Authentication
Cryptography

Cite this

Li, C. T., Lou, D. C., & Chen, T. H. (2000). Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. In IEEE International Conference on Image Processing (Vol. 3)
Li, C. T. ; Lou, D. C. ; Chen, T. H. / Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. IEEE International Conference on Image Processing. Vol. 3 2000.
@inproceedings{12a505fc545d402eb54a9ba7650cacd1,
title = "Image authentication and integrity verification via content-based watermarks and a public key cryptosystem",
abstract = "A technique using the inherent feature map of the underlying image as the watermark is proposed in this work. First, the binary feature map is extracted as watermark and partitioned into blocks. Secondly, neighboring feature map block are blended and encrypted for insertion. On the receiver side, the feature map from the received image is extracted again and compared against the recovered watermark to verify the integrity and authenticity. In addition the capability of detecting geometric transformation, removal of original objects and addition of foreign objects, the proposed scheme is also capable of localizing tampering and detecting cropping without a priori knowledge about the image.",
author = "Li, {C. T.} and Lou, {D. C.} and Chen, {T. H.}",
year = "2000",
language = "English",
volume = "3",
booktitle = "IEEE International Conference on Image Processing",

}

Li, CT, Lou, DC & Chen, TH 2000, Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. in IEEE International Conference on Image Processing. vol. 3, International Conference on Image Processing (ICIP 2000), Vancouver, BC, Canada, 10/09/00.

Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. / Li, C. T.; Lou, D. C.; Chen, T. H.

IEEE International Conference on Image Processing. Vol. 3 2000.

Research output: Book chapter/Published conference paperConference paper

TY - GEN

T1 - Image authentication and integrity verification via content-based watermarks and a public key cryptosystem

AU - Li, C. T.

AU - Lou, D. C.

AU - Chen, T. H.

PY - 2000

Y1 - 2000

N2 - A technique using the inherent feature map of the underlying image as the watermark is proposed in this work. First, the binary feature map is extracted as watermark and partitioned into blocks. Secondly, neighboring feature map block are blended and encrypted for insertion. On the receiver side, the feature map from the received image is extracted again and compared against the recovered watermark to verify the integrity and authenticity. In addition the capability of detecting geometric transformation, removal of original objects and addition of foreign objects, the proposed scheme is also capable of localizing tampering and detecting cropping without a priori knowledge about the image.

AB - A technique using the inherent feature map of the underlying image as the watermark is proposed in this work. First, the binary feature map is extracted as watermark and partitioned into blocks. Secondly, neighboring feature map block are blended and encrypted for insertion. On the receiver side, the feature map from the received image is extracted again and compared against the recovered watermark to verify the integrity and authenticity. In addition the capability of detecting geometric transformation, removal of original objects and addition of foreign objects, the proposed scheme is also capable of localizing tampering and detecting cropping without a priori knowledge about the image.

UR - http://www.scopus.com/inward/record.url?scp=0034442403&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0034442403&partnerID=8YFLogxK

M3 - Conference paper

AN - SCOPUS:0034442403

VL - 3

BT - IEEE International Conference on Image Processing

ER -

Li CT, Lou DC, Chen TH. Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. In IEEE International Conference on Image Processing. Vol. 3. 2000