Share Email Print

Proceedings Paper

Image authentication with a time-stamped signature of the image and secret key encryption
Author(s): Ju-Yun Cheng; Long-Wen Chang
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Most Watermarking in copyright protection is usually concentrated on how to=make the=watermark robust to resist= any intetional or unintentional attacks. They often do not consider how to resolve the rightful ownership if several= watermarks are detected.= In this paper,=we use the block wavelet transform that is included in the compression standard ? jpeg=2000=to= compute=coefficients.= The image=is partitioned into non-overlapped=blocks and then=each=block is decomposed=into 10= subbands. For each block, we find a list of significant wavelet coefficients to embed the watermark. Then, we use a= cryptography=algirithm=rc6 to select the coefficients=from=the=list of significant=wavelet=coefficients=for watwrmarking.= Finally,=we=embed=the watermark=in the=image.=The purpose of using=the encryption=algorithm=is=that=the watermarking= algorithm can be public while the wavelet coefficients for embedding the watermark can be known only through the= secrete key of the encryption algorithm.=

Paper Details

Date Published: 30 August 2002
PDF: 8 pages
Proc. SPIE 4925, Electronic Imaging and Multimedia Technology III, (30 August 2002); doi: 10.1117/12.481573
Show Author Affiliations
Ju-Yun Cheng, National Tsing Hua Univ. (Taiwan)
Long-Wen Chang, National Tsing Hua Univ. (Taiwan)

Published in SPIE Proceedings Vol. 4925:
Electronic Imaging and Multimedia Technology III
LiWei Zhou; Chung-Sheng Li; Yoshiji Suzuki, Editor(s)

© SPIE. Terms of Use
Back to Top