Share Email Print
cover

Proceedings Paper

Image authentication with a time-stamped signature of the image and secret key encryption
Author(s): Ju-Yun Cheng; Long-Wen Chang
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

Most Watermarking in copyright protection is usually concentrated on how to=make the=watermark robust to resist= any intetional or unintentional attacks. They often do not consider how to resolve the rightful ownership if several= watermarks are detected.= In this paper,=we use the block wavelet transform that is included in the compression standard ? jpeg=2000=to= compute=coefficients.= The image=is partitioned into non-overlapped=blocks and then=each=block is decomposed=into 10= subbands. For each block, we find a list of significant wavelet coefficients to embed the watermark. Then, we use a= cryptography=algirithm=rc6 to select the coefficients=from=the=list of significant=wavelet=coefficients=for watwrmarking.= Finally,=we=embed=the watermark=in the=image.=The purpose of using=the encryption=algorithm=is=that=the watermarking= algorithm can be public while the wavelet coefficients for embedding the watermark can be known only through the= secrete key of the encryption algorithm.=

Paper Details

Date Published: 30 August 2002
PDF: 8 pages
Proc. SPIE 4925, Electronic Imaging and Multimedia Technology III, (30 August 2002); doi: 10.1117/12.481573
Show Author Affiliations
Ju-Yun Cheng, National Tsing Hua Univ. (Taiwan)
Long-Wen Chang, National Tsing Hua Univ. (Taiwan)


Published in SPIE Proceedings Vol. 4925:
Electronic Imaging and Multimedia Technology III
LiWei Zhou; Chung-Sheng Li; Yoshiji Suzuki, Editor(s)

© SPIE. Terms of Use
Back to Top