Advertisement

Digital Image Authentication Based on Turbo Codes

  • Qing Yang
  • Kefei Chen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3311)

Abstract

Image ownership authentication is an important part of copyright protection, and digital watermark can be used to implement this task. In this paper, we propose a new image authentication plan concentrating on its security performance. Secret information used as the copyright owner’s signature is first turbo coded, encrypted, scaled and then processed in wavelet domain. The original image is also needed in signature extraction. Simulation results are finally given to draw our conclusions.

Keywords

Discrete Wavelet Transform Watermark Image Error Correct Code Turbo Code Convolutional Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Berrou, C., Glavieux, A.: Near Optimum Error Correcting Coding and Decoding: Turbocodes. IEEE Transactions on Communications 44(10), 1261–1271 (1996)CrossRefGoogle Scholar
  2. 2.
    Diffie, D., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)zbMATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Mallat, S.G.: Multifrequency Channel Decompositions of Images and Wavelet Models. IEEE Transactions on Acoustics, Speech, and Signal Processing 37(12), 2091–2110 (1989)CrossRefGoogle Scholar
  4. 4.
    Chou, J., Ramchandran, K.: Robust Turbo-based Data Hiding for Image and Video Sources. In: ICME, pp. 565–568 (2002)Google Scholar
  5. 5.
    Cvejic, N., Tujkovic, D., Seppanen, T.: Increasing Robustness of an Audio Watermark Using Turbo Codes. In: ICME, pp. 217–220 (2003)Google Scholar
  6. 6.
    Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  7. 7.
    Kuroda, K., Nishigaki, M., Soga, M., Takubo, A., Nakamura, I.: A Digital Watermark Using Public-key Cryptography for Open Algorithm (2003), http://charybdis.mit.csu.edu.au/~mantolov/CD/ICITA2002/papers/131-21.pdf
  8. 8.
    Benedetto, S., Divsalar, D., Montorsi, G., Pollara, F.: Analysis, Design and Iterative Decoding of Double Serially Concatenated Codes with Interleavers. IEEE Journal on Selected Areas in Communications 16(2), 231–244 (1998)CrossRefGoogle Scholar
  9. 9.
    Hagenauer, J., Offer, E., Papke, L.: Iterative Decoding of Binary Block and Convolutional Codes. IEEE Transactions on Information Theory 42(2), 429–445 (1996)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Qing Yang
    • 1
  • Kefei Chen
    • 1
  1. 1.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations