{"title":"基于奇异值分解的可恢复认证水印","authors":"Kil-Sang Yoo","doi":"10.1109/ICCIT.2010.5711209","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a new method for authentication, and recoverability of digital images using Singular Value Decomposition. Using this technique, we can detect any modification made to the image and indicate the specific locations where the modification was made. The new method is recoverable in the sense that, if the image is deemed authentic, the distortion on the extraction procedure can be removed to obtain the original image data. Authentication data is produced from XOR operation between watermark image and binary bits obtained from singular value of one block image. If the unmodified watermarked image is used, the extraction process will return the correct watermark signal and exact original image. The techniques provide new assurance tools for integrity protection of sensitive imagery such as medical images.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A recoverable watermarking for authentication using Singular Value Decomposition\",\"authors\":\"Kil-Sang Yoo\",\"doi\":\"10.1109/ICCIT.2010.5711209\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a new method for authentication, and recoverability of digital images using Singular Value Decomposition. Using this technique, we can detect any modification made to the image and indicate the specific locations where the modification was made. The new method is recoverable in the sense that, if the image is deemed authentic, the distortion on the extraction procedure can be removed to obtain the original image data. Authentication data is produced from XOR operation between watermark image and binary bits obtained from singular value of one block image. If the unmodified watermarked image is used, the extraction process will return the correct watermark signal and exact original image. The techniques provide new assurance tools for integrity protection of sensitive imagery such as medical images.\",\"PeriodicalId\":131337,\"journal\":{\"name\":\"5th International Conference on Computer Sciences and Convergence Information Technology\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"5th International Conference on Computer Sciences and Convergence Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIT.2010.5711209\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th International Conference on Computer Sciences and Convergence Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIT.2010.5711209","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A recoverable watermarking for authentication using Singular Value Decomposition
In this paper, we propose a new method for authentication, and recoverability of digital images using Singular Value Decomposition. Using this technique, we can detect any modification made to the image and indicate the specific locations where the modification was made. The new method is recoverable in the sense that, if the image is deemed authentic, the distortion on the extraction procedure can be removed to obtain the original image data. Authentication data is produced from XOR operation between watermark image and binary bits obtained from singular value of one block image. If the unmodified watermarked image is used, the extraction process will return the correct watermark signal and exact original image. The techniques provide new assurance tools for integrity protection of sensitive imagery such as medical images.