Abstract
The increased use of multimedia applications pose more problems concerning the preservation of confidentiality and authenticity of the transmission of digital data. These data, in particular the images should be protected from tampering. The solution is the use of fragile watermarking. Fragile watermarking can be modeled as a problem of communication of a signal over a noisy and hostile channel, where the attack takes place. Indeed, the use of error checking algorithms appear natural. . Cyclic redundancy check (CRC) code provides a simple, yet powerful, method for the detection of burst errors during digital data transmission and storage. CRC is one of the most versatile error checking algorithm used in various digital communication systems. In this paper, we propose a novel fragile watermarking scheme based CRC checksum and public key cryptosystem for RGB color image authentication.
Chapter PDF
Similar content being viewed by others
Keywords
References
Voyatzis, G., Nikolaidis, N., Pitas, I.: Digital Image Watermarking: An Overview. In: 9th IEEE European Signal Processing Conference, vol. 1, pp. 9–12 (1998)
Barni, M., Cox, I., Kalker, T., Kim, H.J.: Digital Watermarking. In: 4th International Workshop, IWDW, Siena, Italy, September 15-17, Proceedings Series. Lecture Notes in Computer Science, vol. 3710 (2005)
Mitthelholzer, T.: An Information- Theoric Approach to Steganography and Wateramarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–17. Springer, Heidelberg (2000)
Golea, N.E.H., Seghir, R., Benzid, R.: A Bind RGB Color Image Watermarking Based on Singular Value Decomposition. In: IEEE/ACS International Conference on Computer Systems and Applications - AICCSA 2010, pp. 1–5 (2010)
Zhao, X., Ho, A.T.S.: An Introduction to Robust Transform Based Image Watermarking Techniques. In: Collection of Intelligent Multimedia Analysis for Security Applications, pp. 337–364 (2010)
Wong, P.W., Memon, N.: Secret and public key image-watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10(10) (2001)
Fridrich, J.: Security of Fragile Authentication Watermarks with Localization. In: Proc. SPIE, vol. 4675, pp. 691–700 (January 2002)
Lin, P., Huang, P., Peng, A.: A Fragile Watermarking Scheme for Image Authentication with Localization and Recovery. In: IEEE Sixth International Symposium on Multimedia Software Engineering (MSE 2004), Florida, USA (2004)
Tanebaum, A.S.: Computer Networks, 4th edn. Pearson Education International, The Netherlands (2003)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM 21, 120–126 (1978)
Bellare, M., Rogaway, P.: Optimal Asymetric Encryption – How to Encrypt with RSA. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92–111. Springer, Heidelberg (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Golea, N.EH. (2012). A Fragile Watermarking Scheme Based CRC Checksum and Public Key Cryptosystem for RGB Color Image Authentication. In: Elmoataz, A., Mammass, D., Lezoray, O., Nouboud, F., Aboutajdine, D. (eds) Image and Signal Processing. ICISP 2012. Lecture Notes in Computer Science, vol 7340. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31254-0_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-31254-0_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31253-3
Online ISBN: 978-3-642-31254-0
eBook Packages: Computer ScienceComputer Science (R0)