Fragile watermarking and unkeyed hash function implementation for image authentication on CNN-UM
Proceedings of the 2002 7th IEEE International Workshop on Cellular Neural Networks and Their Applications - Trang 399-406
Tóm tắt
Image authentication and integrity have become an important issue for multimedia applications since digital images may be easily modified and perfectly reproduced. This paper addresses the protection of image authentication and integrity on CNN-UM. Watermarking and cryptographic hash functions are techniques used for this protection. We propose two methods using each technique, spatial domain fragile watermarking and a novel unkeyed hash function named Cellhash2D.
Từ khóa
#Watermarking #Cryptography #Cellular neural networks #Digital images #Protection #Security #Cameras #Robustness #Message authentication #ProductionTài liệu tham khảo
10.1109/ICIP.1994.413536
10.1117/1.482612
10.1109/ICIP.1996.560423
wolgang, 1999, Fragile watermarking using VW2D watermark, Proc of the IS&T/SPIE Conf on the security and watermarking of multimedia Contents, 204, 10.1117/12.344670
10.1145/278476.278485
wu, 1998, Watermarking for image authentication, Proc of the IEEE Int Conf on Image Processing, 2, 437
xie, 1998, Joint wavelet compression and authentication watermarking, Proc of the IEEE Int Conf on Image Processing, 2, 427
10.1109/CNNA.2002.1035038
barni, 2000, Digital Watermarking for the Authentication of AVS data, Proc of European Signal Processing Conference EUSIPCO 2000, 1037
10.1109/5.959338
lin, 1999, A Review of Fragile Image watermarks, Proc of Multimedia and Security Workshop Multimedia contents
10.1109/79.879337
10.1109/82.222815
menezes, 1996, Handbook of Applied Cryptography, 10.1201/9781439821916
linan, 2000, A Mixed-signal 64×64 CNN Universal Chip: Towards the Visual Microprocessor, VLSI Design and Use of Cellular Network Universal Machines, 258
10.1109/31.7600
10.1109/5.771067
preneel, 1993, Analysis and Design of Cryptographic Hash Functions
walton, 1995, Information authentication for slippery new age, Dr Dobbs Journal, 20, 18
wolfram, 1994, Cellular Automata and Complexity
10.1109/81.563626
10.1109/CNNA.1996.566613
csapodi, 2000, High Speed Calculation of Cryptographic Hash Functions by CNN Chips, Proc of IEEE Int Workshop on Cellular Neural Networks and Their Applications (CNNA'98), 186
daemen, 1995, Cipher and hash function design. Strategies based on linear and differential cryptanalysis
10.1007/0-387-34805-0_39
daemen, 1993, A framework for the design of one-way hash functions including analysis of Damgard's one-way hash function based on CA, Advances in Cryptology - ASIACRYPT?98, 82, 10.1007/3-540-57332-1_7
