Fragile watermarking and unkeyed hash function implementation for image authentication on CNN-UM

M.T.E. Yalcin1, J. Vandewalle1
1Department of Electrical Engineering (ESAT), SCD-SISTA, Katholieke Universiteit Leuven, Leuven, Belgium

Tóm tắt

Image authentication and integrity have become an important issue for multimedia applications since digital images may be easily modified and perfectly reproduced. This paper addresses the protection of image authentication and integrity on CNN-UM. Watermarking and cryptographic hash functions are techniques used for this protection. We propose two methods using each technique, spatial domain fragile watermarking and a novel unkeyed hash function named Cellhash2D.

Từ khóa

#Watermarking #Cryptography #Cellular neural networks #Digital images #Protection #Security #Cameras #Robustness #Message authentication #Production

Tài liệu tham khảo

10.1109/ICIP.1994.413536 10.1117/1.482612 10.1109/ICIP.1996.560423 wolgang, 1999, Fragile watermarking using VW2D watermark, Proc of the IS&T/SPIE Conf on the security and watermarking of multimedia Contents, 204, 10.1117/12.344670 10.1145/278476.278485 wu, 1998, Watermarking for image authentication, Proc of the IEEE Int Conf on Image Processing, 2, 437 xie, 1998, Joint wavelet compression and authentication watermarking, Proc of the IEEE Int Conf on Image Processing, 2, 427 10.1109/CNNA.2002.1035038 barni, 2000, Digital Watermarking for the Authentication of AVS data, Proc of European Signal Processing Conference EUSIPCO 2000, 1037 10.1109/5.959338 lin, 1999, A Review of Fragile Image watermarks, Proc of Multimedia and Security Workshop Multimedia contents 10.1109/79.879337 10.1109/82.222815 menezes, 1996, Handbook of Applied Cryptography, 10.1201/9781439821916 linan, 2000, A Mixed-signal 64×64 CNN Universal Chip: Towards the Visual Microprocessor, VLSI Design and Use of Cellular Network Universal Machines, 258 10.1109/31.7600 10.1109/5.771067 preneel, 1993, Analysis and Design of Cryptographic Hash Functions walton, 1995, Information authentication for slippery new age, Dr Dobbs Journal, 20, 18 wolfram, 1994, Cellular Automata and Complexity 10.1109/81.563626 10.1109/CNNA.1996.566613 csapodi, 2000, High Speed Calculation of Cryptographic Hash Functions by CNN Chips, Proc of IEEE Int Workshop on Cellular Neural Networks and Their Applications (CNNA'98), 186 daemen, 1995, Cipher and hash function design. Strategies based on linear and differential cryptanalysis 10.1007/0-387-34805-0_39 daemen, 1993, A framework for the design of one-way hash functions including analysis of Damgard's one-way hash function based on CA, Advances in Cryptology - ASIACRYPT?98, 82, 10.1007/3-540-57332-1_7