In this paper we propose an asymmetric cryptography as subset of digital hologram watermarking, which is able to detect malicious tampering while tolerating some incidental distortions. It is a fragile watermark; in fact the mark is readily altered or destroyed when the host image is modified through a linear or nonlinear transformation. The proposed technique could be applied to Color Images as well as to Gray Scale ones. Using digital hologram watermarking, the embedded mark could be easily recovered by means of a Fourier Transform. Due to this fact host image can be tampered and watermarked with the same holographic pattern. To avoid this possibility we have introduced an encryption method using an asymmetric Cryptography. The proposed schema is based on the knowledge of original mark from the Authentication Entity, for applying Image Correlation between this and the extracted one.

DE SANTIS, M., SCHIRRIPA SPAGNOLO, G. (2006). Asymmetric Cryptography as subset of Digital Hologram Watermarking. In Proc. European Signal Processing Conference (EUSIPCO 2006). Lausanne : EUSIPCO.

Asymmetric Cryptography as subset of Digital Hologram Watermarking

DE SANTIS, MICHELE
Writing – Original Draft Preparation
;
SCHIRRIPA SPAGNOLO, Giuseppe
Membro del Collaboration Group
2006-01-01

Abstract

In this paper we propose an asymmetric cryptography as subset of digital hologram watermarking, which is able to detect malicious tampering while tolerating some incidental distortions. It is a fragile watermark; in fact the mark is readily altered or destroyed when the host image is modified through a linear or nonlinear transformation. The proposed technique could be applied to Color Images as well as to Gray Scale ones. Using digital hologram watermarking, the embedded mark could be easily recovered by means of a Fourier Transform. Due to this fact host image can be tampered and watermarked with the same holographic pattern. To avoid this possibility we have introduced an encryption method using an asymmetric Cryptography. The proposed schema is based on the knowledge of original mark from the Authentication Entity, for applying Image Correlation between this and the extracted one.
2006
DE SANTIS, M., SCHIRRIPA SPAGNOLO, G. (2006). Asymmetric Cryptography as subset of Digital Hologram Watermarking. In Proc. European Signal Processing Conference (EUSIPCO 2006). Lausanne : EUSIPCO.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11590/271918
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? ND
social impact