Abstract
In this paper, we proposed a new image content-based authenticity verification procedure for wireless image authentication scheme. The existing image content-based authentication procedure for wireless image authentication scheme has the following shortcomings: 1) High computational cost and 2) Low performance. To overcome above drawbacks, a new image content authenticity verification procedure has been proposed. The proposed method enhances the authentication results with low computational cost and high performance by comparing with existing content-based authentication procedure. The proposed scheme implemented the existing methods like secret wavelet filter parameterization, wireless image authentication and structural digital signature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Lou, D.C., Liu, J.L., Li, C.T.: Digital Signature-Based Image Authentication: Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property. In: Lu, C.S. (ed.), Idea Group Inc. (2003)
Rey, C., Dugelay, J.L.: A survey of watermarking algorithms for image authentication. EURASIP J. Applied Signal Processing 6(3), 613–621 (2002)
Fridrich, J., Baldoza, A.C., Simard, R.J.: Robust digital watermarking based on key dependent basis functions. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 143–157. Springer, Heidelberg (1998)
Swaminathan, A., Mao, Y., Wu, M.: Robust and secure image hashing. IEEE Trans. Inf. Forensics Sec., 215–229 (2006)
Schneider, M., Chang, S.F.: A Content based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing (ICIP 1996), pp. 227–230 (1996)
Han, S., Chu, C.H., Yang, S.: Content-based Image Authentication: Current Status, Issues and Challenges. In: Proc. IEEE Int. Conf. Semantic Computing (ICSC 2007), pp. 630–636 (2007)
Lu, C.S.: On the security of structural information extraction/embedding for image authentication. In: Proc. IEEE ISCAS 2004, pp. 169–172 (2004)
Sun, Q., He, D., Ye, S.: Feature selection for semi fragile signature based authentication systems. In: Proc. IEEE Workshop on Image Signal Processing, pp. 99–103 (2003)
Ye, S., Lin, X., Sun, Q.: Content-based error detection and concealment for image transmission over wireless channel. In: Proc. IEEE Int. Symp. Circuits and Systems, Thailand (2003)
Saad, S.M.: Design of a robust and secure digital signature scheme for image authentication over wireless channels. IET Inf. Secur. 3(1), 1–8 (2009)
Kunder, D., Hatzinakos, D.: Digital watermarking using multiresolution wavelet decomposition. In: Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Seattle, Washington (1998)
Peter, M., Uhl, M.: Watermark security via wavelet filter parameterization. In: Proc. Int. Conf. ICASSP 2000, USA (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lokanadham Naidu, V., Ramani, K., Ganesh, D., Munwar, S., Basha, P. (2010). A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheme. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-15766-0_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15765-3
Online ISBN: 978-3-642-15766-0
eBook Packages: Computer ScienceComputer Science (R0)