Diophantine Equations for Enhanced Security in Watermarking Scheme for Image Authentication

Diophantine Equations for Enhanced Security in Watermarking Scheme for Image Authentication

Padma T (Sona College of Technology, India) and Jayashree Nair (AIMS Institutes, India)
Copyright: © 2017 |Pages: 25
DOI: 10.4018/978-1-5225-2053-5.ch010
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Hard mathematical problems having no polynomial time algorithms to determine a solution are seemly in design of secure cryptosystems. The proposed watermarking system used number theoretic concepts of the hard higher order Diophantine equations for image content authentication scheme with three major phases such as 1) Formation of Diophantine equation; 2) Generation and embedding of dual Watermarks; and 3) Image content authentication and verification of integrity. Quality of the watermarked images, robustness to compression and security are bench-marked with two peer schemes which used dual watermarks.
Chapter Preview
Top

Image Authentication

According to Cox and Miller (2002), digital image authentication is the act of verifying the integrity and authenticity (or credibility) of digital images, i.e. to check if the image has undergone any tampering since its creation. Judging the authenticity of an image is hard, if not impossible, and a judgement cannot be made unless it passes certain tests of integrity and authentication confirmation. An image authentication system is expected to detect manipulations, localize it and to some extent recover the manipulated or altered regions. Measures are needed to ensure that the image is protected against illegal tampering and manipulations. Authentication mechanisms do not protect the image from being stolen or copied.

Complete Chapter List

Search this Book:
Reset