Wuhan University Journal of Natural Sciences

, Volume 10, Issue 1, pp 289–292 | Cite as

A secure public-key image authentication plan

Information Security Techology and Application


Digital watermark can be used for image ownership verification or authentication. In this paper, we propose a new image authentication plan concentrating on its security performance. Digital watermark is first turbo coded, scaled and then processed in wavelet domain. To enhance security level, public key cryptosystem is utilized to replace traditional watermark key. Simulation results are finally given by experiment.

Key words

turbo code image authentication public key cryptosystem digital watermark 

CLC number

TP 309 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Diffie D, Hellman M. New Directions in Cryptography.IEEE Transactions on Information Theory, 1976,22 (6): 644–654.MATHCrossRefMathSciNetGoogle Scholar
  2. [2]
    Kuroda K, Nishigaki M, Soga M,et al. A Digital Watermark Using Public-key Cryptography for Open Algorithm.http://charybdis. mit. scu. edu. au/~mantolov/CD/CITA2002/papers/131-21.pdf, March 2004.Google Scholar
  3. [3]
    Berrou C, Glavieux A. Near Optimum Error Correcting Coding and Decoding: Turbo-Codes.IEEE Transactions on Communications, 1996,44(10):1261–1271.CrossRefGoogle Scholar
  4. [4]
    Mallat S G. Multifrequency Channel Decompositions of Images and Wavelet Models.IEEE Transactions on Acoustics, Speech, and Signal Processing, 1989,37(12):2091–2110.CrossRefGoogle Scholar
  5. [5]
    Chou J, Ramchandran K. Robust Turbo-Based Data Hiding for Image and Video Sources.Proceedings of ICME 2002. New York: IEEE Press, 2002. 565.Google Scholar
  6. [6]
    Cvejic N, Tujkovic D, Seppanen T. Increasing Robustness of an Audio Watermark Using Turbo Codes.Proceedings of ICME 2003. New York: IEEE Press, 2003. 217.Google Scholar
  7. [7]
    Cox I J, Kilian J, Leighton F T,et al. Secure Spread Spectrum Watermarking for Multimedia.IEEE Transactions on Image Processing, 1997,6(12): 1673–1687.CrossRefGoogle Scholar

Copyright information

© Springer 2005

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringShanghai Jiaotong UniversityShanghaiChina

Personalised recommendations