Abstract
Image ownership authentication is an important part of copyright protection, and digital watermark can be used to implement this task. In this paper, we propose a new image authentication plan concentrating on its security performance. Secret information used as the copyright owner’s signature is first turbo coded, encrypted, scaled and then processed in wavelet domain. The original image is also needed in signature extraction. Simulation results are finally given to draw our conclusions.
This work was supported by National Natural Science Foundation of China (NSFC) under the grant 90104005 and National Hi-Tech Research and Development Program of China (863 Program) under the grant 2001AA144060.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Berrou, C., Glavieux, A.: Near Optimum Error Correcting Coding and Decoding: Turbocodes. IEEE Transactions on Communications 44(10), 1261–1271 (1996)
Diffie, D., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Mallat, S.G.: Multifrequency Channel Decompositions of Images and Wavelet Models. IEEE Transactions on Acoustics, Speech, and Signal Processing 37(12), 2091–2110 (1989)
Chou, J., Ramchandran, K.: Robust Turbo-based Data Hiding for Image and Video Sources. In: ICME, pp. 565–568 (2002)
Cvejic, N., Tujkovic, D., Seppanen, T.: Increasing Robustness of an Audio Watermark Using Turbo Codes. In: ICME, pp. 217–220 (2003)
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)
Kuroda, K., Nishigaki, M., Soga, M., Takubo, A., Nakamura, I.: A Digital Watermark Using Public-key Cryptography for Open Algorithm (2003), http://charybdis.mit.csu.edu.au/~mantolov/CD/ICITA2002/papers/131-21.pdf
Benedetto, S., Divsalar, D., Montorsi, G., Pollara, F.: Analysis, Design and Iterative Decoding of Double Serially Concatenated Codes with Interleavers. IEEE Journal on Selected Areas in Communications 16(2), 231–244 (1998)
Hagenauer, J., Offer, E., Papke, L.: Iterative Decoding of Binary Block and Convolutional Codes. IEEE Transactions on Information Theory 42(2), 429–445 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, Q., Chen, K. (2004). Digital Image Authentication Based on Turbo Codes. In: Roca, V., Rousseau, F. (eds) Interactive Multimedia and Next Generation Networks. MIPS 2004. Lecture Notes in Computer Science, vol 3311. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30493-7_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-30493-7_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23928-4
Online ISBN: 978-3-540-30493-7
eBook Packages: Springer Book Archive