A watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking can be used to authenticate parts of the original image. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography allows authenticating cuts of the original image, is the major novelty of this paper. The proposed methodology is characterized as an authentication technique, since it does not rely on the original image to decide whether the watermarked image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property).
SCHIRRIPA SPAGNOLO, G., DE SANTIS, M. (2011). Holographic watermarking for authentication of cut images. OPTICS AND LASERS IN ENGINEERING, 49, 1447-1455 [10.10016/J.optlaseng.2011.06.014].
Holographic watermarking for authentication of cut images
SCHIRRIPA SPAGNOLO, Giuseppe;
2011-01-01
Abstract
A watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking can be used to authenticate parts of the original image. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography allows authenticating cuts of the original image, is the major novelty of this paper. The proposed methodology is characterized as an authentication technique, since it does not rely on the original image to decide whether the watermarked image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property).I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.