Share Email Print

Proceedings Paper

Image authentication by means of fragile CGH watermarking
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

In this paper we propose a fragile marking system based on Computer Generated Hologram coding techniques, which is able to detect malicious tampering while tolerating some incidental distortions. A fragile watermark is a mark that is readily altered or destroyed when the host image is modified through a linear or nonlinear transformation. A fragile watermark monitors the integrity of the content of the image but not its numerical representation. Therefore the watermark is designed so that the integrity is proven if the content of the image has not been tampered. Since digital images can be altered or manipulated with ease, the ability to detect changes to digital images is very important for many applications such as news reporting, medical archiving, or legal usages. The proposed technique could be applied to Color Images as well as to Gray Scale ones. Using Computer Generated Hologram watermarking, the embedded mark could be easily recovered by means of a Fourier Transform. Due to this fact host image can be tampered and watermarked with the same holographic pattern. To avoid this possibility we have introduced an encryption method using a asymmetric Cryptography. The proposed schema is based on the knowledge of original mark from the Authentication

Paper Details

Date Published: 23 September 2005
PDF: 10 pages
Proc. SPIE 5954, Optical Security Systems, 59540W (23 September 2005); doi: 10.1117/12.623134
Show Author Affiliations
Giuseppe Schirripa Spagnolo, Univ. degli Studi di Roma Tre (Italy)
Carla Simonetti, Univ. degli Studi di Roma Tre (Italy)
Lorenzo Cozzella, Univ. degli Studi di Roma Tre (Italy)

Published in SPIE Proceedings Vol. 5954:
Optical Security Systems
Zbigniew Jaroszewicz; Sergei Y. Popov; Frank Wyrowski, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?