A Fragile Watermarking Scheme Based CRC Checksum and Public Key Cryptosystem for RGB Color Image Authentication

  • Nour El-Houda Golea
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7340)

Abstract

The increased use of multimedia applications pose more problems concerning the preservation of confidentiality and authenticity of the transmission of digital data. These data, in particular the images should be protected from tampering. The solution is the use of  fragile watermarking. Fragile watermarking can be modeled as a problem of communication of a signal over a noisy and hostile channel, where the attack takes place. Indeed, the use of  error checking algorithms  appear natural. . Cyclic redundancy check (CRC) code provides a simple, yet powerful, method for the detection of burst errors during digital data transmission and storage. CRC is one of the most versatile error checking algorithm used in various digital communication systems. In this paper, we propose a novel fragile watermarking scheme based CRC checksum and public key cryptosystem for RGB color image authentication.

Keywords

Fragile watermarking image authentication Cyclic redundancy check (CRC) public key cryptosystem RGB color image watermarking 

References

  1. 1.
    Voyatzis, G., Nikolaidis, N., Pitas, I.: Digital Image Watermarking: An Overview. In: 9th IEEE European Signal Processing Conference, vol. 1, pp. 9–12 (1998)Google Scholar
  2. 2.
    Barni, M., Cox, I., Kalker, T., Kim, H.J.: Digital Watermarking. In: 4th International Workshop, IWDW, Siena, Italy, September 15-17, Proceedings Series. Lecture Notes in Computer Science, vol. 3710 (2005)Google Scholar
  3. 3.
    Mitthelholzer, T.: An Information- Theoric Approach to Steganography and Wateramarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–17. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Golea, N.E.H., Seghir, R., Benzid, R.: A Bind RGB Color Image Watermarking Based on Singular Value Decomposition. In: IEEE/ACS International Conference on Computer Systems and Applications - AICCSA 2010, pp. 1–5 (2010)Google Scholar
  5. 5.
    Zhao, X., Ho, A.T.S.: An Introduction to Robust Transform Based Image Watermarking Techniques. In: Collection of Intelligent Multimedia Analysis for Security Applications, pp. 337–364 (2010)Google Scholar
  6. 6.
    Wong, P.W., Memon, N.: Secret and public key image-watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 10(10) (2001)Google Scholar
  7. 7.
    Fridrich, J.: Security of Fragile Authentication Watermarks with Localization. In: Proc. SPIE, vol. 4675, pp. 691–700 (January 2002)Google Scholar
  8. 8.
    Lin, P., Huang, P., Peng, A.: A Fragile Watermarking Scheme for Image Authentication with Localization and Recovery. In: IEEE Sixth International Symposium on Multimedia Software Engineering (MSE 2004), Florida, USA (2004)Google Scholar
  9. 9.
    Tanebaum, A.S.: Computer Networks, 4th edn. Pearson Education International, The Netherlands (2003)Google Scholar
  10. 10.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM 21, 120–126 (1978)MathSciNetMATHCrossRefGoogle Scholar
  11. 11.
    Bellare, M., Rogaway, P.: Optimal Asymetric Encryption – How to Encrypt with RSA. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92–111. Springer, Heidelberg (1995)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Nour El-Houda Golea
    • 1
  1. 1.Department of Computer ScienceUniversity of BATNAAlgeria

Personalised recommendations