Lossless watermarking for image authentication: A new framework and an implementation. Celik, M., Sharma, G, & Tekalp, A. IEEE TRANSACTIONS ON IMAGE PROCESSING, 15(4):1042-1049, APR, 2006. doi abstract bibtex We present a novel framework for lossless (invertible) authentication watermarking, which enables zero-distortion reconstruction of the un-watermarked images upon verification. As opposed to earlier. lossless authentication methods that required reconstruction of the original image prior to validation, the new framework allows validation of the watermarked images before recovery of the original image. This reduces computational requirements in situations when either the verification step fails or the zero-distortion reconstruction is not needed. For verified images, integrity of the reconstructed image is ensured by the uniqueness of the reconstruction procedure. The framework also enables public(-key) authentication without granting access to the perfect original and allows for efficient tamper localization. Effectiveness of the framework is demonstrated by implementing the framework using hierarchical image authentication along with lossless generalized-least significant bit data embedding.
@article{ ISI:000236287400020,
Author = {Celik, MU and Sharma, G and Tekalp, AM},
Title = {{Lossless watermarking for image authentication: A new framework and an
implementation}},
Journal = {{IEEE TRANSACTIONS ON IMAGE PROCESSING}},
Year = {{2006}},
Volume = {{15}},
Number = {{4}},
Pages = {{1042-1049}},
Month = {{APR}},
Abstract = {{We present a novel framework for lossless (invertible) authentication
watermarking, which enables zero-distortion reconstruction of the
un-watermarked images upon verification. As opposed to earlier. lossless
authentication methods that required reconstruction of the original
image prior to validation, the new framework allows validation of the
watermarked images before recovery of the original image. This reduces
computational requirements in situations when either the verification
step fails or the zero-distortion reconstruction is not needed. For
verified images, integrity of the reconstructed image is ensured by the
uniqueness of the reconstruction procedure. The framework also enables
public(-key) authentication without granting access to the perfect
original and allows for efficient tamper localization. Effectiveness of
the framework is demonstrated by implementing the framework using
hierarchical image authentication along with lossless generalized-least
significant bit data embedding.}},
DOI = {{10.1109/TIP.2005.863053}},
ISSN = {{1057-7149}},
ResearcherID-Numbers = {{Sharma, Gaurav/A-1154-2007}},
ORCID-Numbers = {{Sharma, Gaurav/0000-0001-9735-9519}},
Unique-ID = {{ISI:000236287400020}},
}
Downloads: 0
{"_id":"2kNANTFHC79PtFMbb","bibbaseid":"celik-sharma-tekalp-losslesswatermarkingforimageauthenticationanewframeworkandanimplementation-2006","downloads":0,"creationDate":"2016-12-09T13:41:59.915Z","title":"Lossless watermarking for image authentication: A new framework and an implementation","author_short":["Celik, M.","Sharma, G","Tekalp, A."],"year":2006,"bibtype":"article","biburl":"https://drive.google.com/uc?export=download&id=1d5Wvl98W_buJq6prXBz16a_6uF9Cdt-7","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Celik"],"firstnames":["MU"],"suffixes":[]},{"propositions":[],"lastnames":["Sharma"],"firstnames":["G"],"suffixes":[]},{"propositions":[],"lastnames":["Tekalp"],"firstnames":["AM"],"suffixes":[]}],"title":"Lossless watermarking for image authentication: A new framework and an implementation","journal":"IEEE TRANSACTIONS ON IMAGE PROCESSING","year":"2006","volume":"15","number":"4","pages":"1042-1049","month":"APR","abstract":"We present a novel framework for lossless (invertible) authentication watermarking, which enables zero-distortion reconstruction of the un-watermarked images upon verification. As opposed to earlier. lossless authentication methods that required reconstruction of the original image prior to validation, the new framework allows validation of the watermarked images before recovery of the original image. This reduces computational requirements in situations when either the verification step fails or the zero-distortion reconstruction is not needed. For verified images, integrity of the reconstructed image is ensured by the uniqueness of the reconstruction procedure. The framework also enables public(-key) authentication without granting access to the perfect original and allows for efficient tamper localization. Effectiveness of the framework is demonstrated by implementing the framework using hierarchical image authentication along with lossless generalized-least significant bit data embedding.","doi":"10.1109/TIP.2005.863053","issn":"1057-7149","researcherid-numbers":"Sharma, Gaurav/A-1154-2007","orcid-numbers":"Sharma, Gaurav/0000-0001-9735-9519","unique-id":"ISI:000236287400020","bibtex":"@article{ ISI:000236287400020,\nAuthor = {Celik, MU and Sharma, G and Tekalp, AM},\nTitle = {{Lossless watermarking for image authentication: A new framework and an\n implementation}},\nJournal = {{IEEE TRANSACTIONS ON IMAGE PROCESSING}},\nYear = {{2006}},\nVolume = {{15}},\nNumber = {{4}},\nPages = {{1042-1049}},\nMonth = {{APR}},\nAbstract = {{We present a novel framework for lossless (invertible) authentication\n watermarking, which enables zero-distortion reconstruction of the\n un-watermarked images upon verification. As opposed to earlier. lossless\n authentication methods that required reconstruction of the original\n image prior to validation, the new framework allows validation of the\n watermarked images before recovery of the original image. This reduces\n computational requirements in situations when either the verification\n step fails or the zero-distortion reconstruction is not needed. For\n verified images, integrity of the reconstructed image is ensured by the\n uniqueness of the reconstruction procedure. The framework also enables\n public(-key) authentication without granting access to the perfect\n original and allows for efficient tamper localization. Effectiveness of\n the framework is demonstrated by implementing the framework using\n hierarchical image authentication along with lossless generalized-least\n significant bit data embedding.}},\nDOI = {{10.1109/TIP.2005.863053}},\nISSN = {{1057-7149}},\nResearcherID-Numbers = {{Sharma, Gaurav/A-1154-2007}},\nORCID-Numbers = {{Sharma, Gaurav/0000-0001-9735-9519}},\nUnique-ID = {{ISI:000236287400020}},\n}\n\n","author_short":["Celik, M.","Sharma, G","Tekalp, A."],"key":"ISI:000236287400020","id":"ISI:000236287400020","bibbaseid":"celik-sharma-tekalp-losslesswatermarkingforimageauthenticationanewframeworkandanimplementation-2006","role":"author","urls":{},"metadata":{"authorlinks":{}}},"search_terms":["lossless","watermarking","image","authentication","new","framework","implementation","celik","sharma","tekalp"],"keywords":[],"authorIDs":[],"dataSources":["P7SB4qiBxZPhjXYRW","ziFHh7RJJaJNc9iie"]}