Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Novel reversible watermarking scheme for authentication of military images

Novel reversible watermarking scheme for authentication of military images This paper presents a novel reversible watermarking scheme based on histogram modification for the authentication of military images. The Hash Message Authentication Code (HMAC) of the image is computed and embedded into the image for authentication. Based on a criterion, the distinct pixel values with Non-Zero Frequencies of the histogram are selected for embedding watermark bits and the preferred pixel values are stored as a key. This key is used for both the watermark extraction and the original image restoration. The bits of extracted HMAC from the marked image and HMAC of the restored image are compared for authentication. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Signal and Imaging Systems Engineering Inderscience Publishers

Novel reversible watermarking scheme for authentication of military images

Loading next page...
 
/lp/inderscience-publishers/novel-reversible-watermarking-scheme-for-authentication-of-military-2XciiWRstn

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd. All rights reserved
ISSN
1748-0698
eISSN
1748-0701
DOI
10.1504/IJSISE.2009.033725
Publisher site
See Article on Publisher Site

Abstract

This paper presents a novel reversible watermarking scheme based on histogram modification for the authentication of military images. The Hash Message Authentication Code (HMAC) of the image is computed and embedded into the image for authentication. Based on a criterion, the distinct pixel values with Non-Zero Frequencies of the histogram are selected for embedding watermark bits and the preferred pixel values are stored as a key. This key is used for both the watermark extraction and the original image restoration. The bits of extracted HMAC from the marked image and HMAC of the restored image are compared for authentication.

Journal

International Journal of Signal and Imaging Systems EngineeringInderscience Publishers

Published: Jan 1, 2009

There are no references for this article.