Lossless watermarking for image authentication: A new framework and an implementation. Celik, M., Sharma, G, & Tekalp, A. IEEE TRANSACTIONS ON IMAGE PROCESSING, 15(4):1042-1049, APR, 2006.
doi  abstract   bibtex   
We present a novel framework for lossless (invertible) authentication watermarking, which enables zero-distortion reconstruction of the un-watermarked images upon verification. As opposed to earlier. lossless authentication methods that required reconstruction of the original image prior to validation, the new framework allows validation of the watermarked images before recovery of the original image. This reduces computational requirements in situations when either the verification step fails or the zero-distortion reconstruction is not needed. For verified images, integrity of the reconstructed image is ensured by the uniqueness of the reconstruction procedure. The framework also enables public(-key) authentication without granting access to the perfect original and allows for efficient tamper localization. Effectiveness of the framework is demonstrated by implementing the framework using hierarchical image authentication along with lossless generalized-least significant bit data embedding.
@article{ ISI:000236287400020,
Author = {Celik, MU and Sharma, G and Tekalp, AM},
Title = {{Lossless watermarking for image authentication: A new framework and an
   implementation}},
Journal = {{IEEE TRANSACTIONS ON IMAGE PROCESSING}},
Year = {{2006}},
Volume = {{15}},
Number = {{4}},
Pages = {{1042-1049}},
Month = {{APR}},
Abstract = {{We present a novel framework for lossless (invertible) authentication
   watermarking, which enables zero-distortion reconstruction of the
   un-watermarked images upon verification. As opposed to earlier. lossless
   authentication methods that required reconstruction of the original
   image prior to validation, the new framework allows validation of the
   watermarked images before recovery of the original image. This reduces
   computational requirements in situations when either the verification
   step fails or the zero-distortion reconstruction is not needed. For
   verified images, integrity of the reconstructed image is ensured by the
   uniqueness of the reconstruction procedure. The framework also enables
   public(-key) authentication without granting access to the perfect
   original and allows for efficient tamper localization. Effectiveness of
   the framework is demonstrated by implementing the framework using
   hierarchical image authentication along with lossless generalized-least
   significant bit data embedding.}},
DOI = {{10.1109/TIP.2005.863053}},
ISSN = {{1057-7149}},
ResearcherID-Numbers = {{Sharma, Gaurav/A-1154-2007}},
ORCID-Numbers = {{Sharma, Gaurav/0000-0001-9735-9519}},
Unique-ID = {{ISI:000236287400020}},
}
Downloads: 0