Skip to main content

A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheme

  • Conference paper
Information and Communication Technologies (ICT 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 101))

  • 1331 Accesses

Abstract

In this paper, we proposed a new image content-based authenticity verification procedure for wireless image authentication scheme. The existing image content-based authentication procedure for wireless image authentication scheme has the following shortcomings: 1) High computational cost and 2) Low performance. To overcome above drawbacks, a new image content authenticity verification procedure has been proposed. The proposed method enhances the authentication results with low computational cost and high performance by comparing with existing content-based authentication procedure. The proposed scheme implemented the existing methods like secret wavelet filter parameterization, wireless image authentication and structural digital signature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lou, D.C., Liu, J.L., Li, C.T.: Digital Signature-Based Image Authentication: Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. In: Lu, C.S. (ed.), Idea Group Inc. (2003)

    Google Scholar 

  2. Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP J. Applied Signal Processing 6(3), 613–621 (2002)

    Article  Google Scholar 

  3. Fridrich, J., Baldoza, A.C., Simard, R.J.: Robust digital watermarking based on key dependent basis functions. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 143–157. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Sec., 215–229 (2006)

    Google Scholar 

  5. Schneider, M., Chang, S.F.: A Content based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing (ICIP 1996), pp. 227–230 (1996)

    Google Scholar 

  6. Han, S., Chu, C.H., Yang, S.: Content-based Image Authentication: Current Status, Issues and Challenges. In: Proc. IEEE Int. Conf. Semantic Computing (ICSC 2007), pp. 630–636 (2007)

    Google Scholar 

  7. Lu, C.S.: On the security of structural information extraction/embedding for image authentication. In: Proc. IEEE ISCAS 2004, pp. 169–172 (2004)

    Google Scholar 

  8. Sun, Q., He, D., Ye, S.: Feature selection for semi fragile signature based authentication systems. In: Proc. IEEE Workshop on Image Signal Processing, pp. 99–103 (2003)

    Google Scholar 

  9. Ye, S., Lin, X., Sun, Q.: Content-based error detection and concealment for image transmission over wireless channel. In: Proc. IEEE Int. Symp. Circuits and Systems, Thailand (2003)

    Google Scholar 

  10. Saad, S.M.: Design of a robust and secure digital signature scheme for image authentication over wireless channels. IET Inf. Secur. 3(1), 1–8 (2009)

    Article  Google Scholar 

  11. Kunder, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Seattle, Washington (1998)

    Google Scholar 

  12. Peter, M., Uhl, M.: Watermark security via wavelet filter parameterization. In: Proc. Int. Conf. ICASSP 2000, USA (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lokanadham Naidu, V., Ramani, K., Ganesh, D., Munwar, S., Basha, P. (2010). A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheme. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15766-0_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15765-3

  • Online ISBN: 978-3-642-15766-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics