A semi-fragile watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking is used for image authentication. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography, to authenticate even small pieces of the original image, is the major novelty ot this paper. In fact, holography allows the hidden data to be resistant to cropping attacks. The proposed methodology is characterized as a blind semifragile authentication technique, since it does not rely on the original image to decide whether the Watermarked Image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property).

SCHIRRIPA SPAGNOLO, G., MICHELE de, S. (2008). Holographic semi-fragile watermarking combined with asymmetric crytography. In VIIP 2008 - Visualization, Imaging, and Processing (pp.268-273). Palma de Mallorca : IASTED.

Holographic semi-fragile watermarking combined with asymmetric crytography

SCHIRRIPA SPAGNOLO, Giuseppe
Writing – Original Draft Preparation
;
2008-01-01

Abstract

A semi-fragile watermarking technique, with a Computer Generated Hologram (CGH) coding system of the mark, is introduced and tested. The CGH watermarking is used for image authentication. The hologram of the mark is embedded in the spatial domain by a blind additive embedding technique. The use of holography, to authenticate even small pieces of the original image, is the major novelty ot this paper. In fact, holography allows the hidden data to be resistant to cropping attacks. The proposed methodology is characterized as a blind semifragile authentication technique, since it does not rely on the original image to decide whether the Watermarked Image has been altered or not and at the same time it is able to detect and localize any possible malicious change. Asymmetric cryptography is used to hide the hash information in an unambiguous way (non-repudiation property).
2008
978-0-88986-759-B
SCHIRRIPA SPAGNOLO, G., MICHELE de, S. (2008). Holographic semi-fragile watermarking combined with asymmetric crytography. In VIIP 2008 - Visualization, Imaging, and Processing (pp.268-273). Palma de Mallorca : IASTED.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11590/176436
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact