PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A robust watermarking technique for Image content authentication

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Konferencja
Communication Papers of the 2017 Federated Conference on Computer Science and Information Systems
Języki publikacji
EN
Abstrakty
EN
A robust watermarking technique for image content authentication is proposed. The scheme is robust to minor modifications resulting from legitimate image processing operations. At the same time, the modifications affecting image content are classified as forgery attacks by the proposed scheme. Simulation results are given for intentional modifications (i.e., forgery attacks) as well as unintentional modifications in the presence of different noise environments, including the coded orthogonal frequency division multiplexing which is used in 5G networks, to prove the effectiveness of the proposed scheme. A security analysis of the proposed watermarking scheme is given in the end.
Rocznik
Tom
Strony
223--226
Opis fizyczny
Bibliogr. 12 poz., fot.
Twórcy
  • Chair for Data Communications Systems, University of Siegen, Hoelderlinstrasse 3, 57076 Siegen, Germany
autor
  • Chair for Data Communications Systems, University of Siegen, Hoelderlinstrasse 3, 57076 Siegen, Germany
Bibliografia
  • 1. I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, “Digital Watermarking and Steganography”, Morgan Kaufmann, 2007.
  • 2. H. Fiestel, “Cryptography and Computer Privacy”, Scientific American, May 1973, vol. 228, no. 5, pp. 15-23.
  • 3. O. Ur-Rehman, “Applications of iterative soft decision decoding”. Aachen: Shaker Verlag; 2013. ISBN:978-3-8440-1641-3.
  • 4. R. Graveman and K. Fu, “Approximate message authentication codes,” in Proceedings of 3rd Fed. lab Symposium on Advanced Telecommunications/Information Distribution, vol. 1, College Park, MD, Feb. 1999.
  • 5. ISO/IEC 9797-1:2011, “Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher”.
  • 6. ISO/IEC 9797-2:2011, “Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 2: Mechanisms using a dedicated hash-function”.
  • 7. C. Boncelet, “The NTMAC for authentication of noisy messages”, IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 35-42, Mar. 2006.
  • 8. Joint Channel Coding and Cryptography, Shaker Verlag, Aachen, 2008, ISBN 978-3-8322-7180-0.
  • 9. O. Ur-Rehman, N. Zivic, S.A.H.A.E. Tabatabaei, C. Ruland, "Error Correcting and Weighted Noise Tolerant Message Authentication Codes," 5th International Conference on Signal Processing and Communication Systems (ICSPCS), pp. 1-8, December 12-14, 2011.
  • 10. O. Ur-Rehman, N. Živic, "Discrete Wavelet Transform based Watermarking for Image Content Authentication”, 6th International Conference on Patterns Recognition Applications and Methods, Feb 24-26, 2017, Porto, Portugal.
  • 11. D. Onien, R. Safavi-Naini, and P. Nickolas, “Breaking and repairing an approximate message authentication scheme,” Discrete Mathematics, Algorithms and Applications, World Scientific Publishing Company, 2011.
  • 12. G. Di Crescenzo, R. F. Graveman, G. Arce and R. Ge, A Formal Security Analysis of Approximate Message Authentication Codes, Proc. of the 2003 CTA Annual Symposium, a US Dept. of Defense publication.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2a898c5b-7bbe-442e-8e69-06cdb577c12f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.