Advertisement

A Semi-fragile Steganographic Digital Signature for Images

  • Luke Hebbes
  • Andrew Lenaghan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3269)

Abstract

Content security requires authenticity given by integrity checks, authentication and non-repudiation. This can be achieved by using digital signatures. This paper presents a new semi-fragile steganographic technique for embedding digital signatures in images. This is achieved by using a novel modified Bit-Plane Complexity Segmentation (BPCS) Based Steganography scheme. Semi-fragile implies survival from limited processing, which is achieved by utilising Convolutional coding, a Forward Error Correcting (FEC) channel coding technique, in the embedding.

Keywords

Forward Error Correct Convolutional Code Fragile Watermark Robust Watermark Image Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    British Journal of Photography, p. 5. Timothy Benn Publishing (March 24, 2004)Google Scholar
  2. 2.
    Lin, E.T., Podilchuk, C.I., Delp, E.J.: Detection of Image Alterations Using Semi- Fragile Watermarks. In: Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents II, San Jose, CA, January 23-28, vol. 3971, pp. 152–163 (2000)Google Scholar
  3. 3.
    Sun, Q., Chang, S.-F., Kurato, M., Suto, M.: A new semi-fragile image authentication framework combining ECC and PKI Infrastructures, Invited paper for Special Session on Multimedia Watermarking, ISCAS 2002, Phoenix, USA (2002)Google Scholar
  4. 4.
    Wayner, P.: Disappearing Cryptography, Information Hiding: Steganography & Watermarking, 2nd edn., pp. 291–302. Morgan Kaufmann, San Francisco (2002)Google Scholar
  5. 5.
    Kawaguchi, E.: The Principle of BPCS-Steganography, Kyushu Institute of Technology, Japan (October 2001)Google Scholar
  6. 6.
    Hoffmann, G.: Luminance Models for the Grayscale Conversion (March 30, 2002)Google Scholar
  7. 7.
    Schneier, B.: Applied Cryptography, 2nd edn. Wiley, Chichester (1996)Google Scholar
  8. 8.
    Hebbes, L., Malyan, R.: Comparative Performance Modelling of Turbo, Block and Convolutional Coding over very noisy Channels. In: 6th IFIP Conference on ATM, Bradford (1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Luke Hebbes
    • 1
  • Andrew Lenaghan
    • 1
  1. 1.Networking & Communications Group, School of Computing & Information SystemsKingston UniversityKingston upon ThamesUK

Personalised recommendations