Please use this identifier to cite or link to this item:
http://hdl.handle.net/2307/506
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Schirripa Spagnolo, Giuseppe | - |
dc.contributor.author | De Santis, Michele | - |
dc.date.accessioned | 2011-07-01T09:40:06Z | - |
dc.date.available | 2011-07-01T09:40:06Z | - |
dc.date.issued | 2009-04-23 | - |
dc.identifier.uri | http://hdl.handle.net/2307/506 | - |
dc.description.abstract | Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The fragile watermarking shows the limits of its applicability, when secure transacting of digital content is required. In this case, the authentication algorithm should be able to distinguish incidental integrity maintaining distortions such as lossy compression from malicious manipulations. This has motivated further researches into semi-fragile watermarking. Two novel watermarking algorithms are proposed in this thesis, both robust to self-authenticating. The first algorithm is a fragile spatial parity-checking watermarking method that employs a public-key scheme for still image authentication and integrity verification. The use of the parity-checking scheme and the public-key encryption enables the localization of tampered areas and the authentication of the watermarked image respectevely. The second algorithm is a semi-fragile holographic watermarking system. The previous algorithm is a really powerfull system to be a fragile technique but still not usefull for secure transacting over the Internet. The holographic technique enables good perfomances against distortions and is still able to guarantee the authenticity and the integrity of digital images. The authenticity is achieved by a public-key encryption of the mark and the integrity is achieved by the holography introduced in this technique. In addition, the thesis provides theoretical analysis for the perfomance and the feasibility of both schemes.We also present experimental results to verify the theoretical observations and the comparison results for both algorithms to popular techniques. | it_IT |
dc.language.iso | en | it_IT |
dc.publisher | Università degli studi Roma Tre | it_IT |
dc.title | Fragile watermarking techniques for image authentication | it_IT |
dc.type | Doctoral Thesis | it_IT |
dc.subject.miur | Settori Disciplinari MIUR::Ingegneria industriale e dell'informazione::ELETTRONICA | it_IT |
dc.subject.miur | Ingegneria industriale e dell'informazione | - |
dc.subject.isicrui | Categorie ISI-CRUI::Ingegneria industriale e dell'informazione::Electrical & Electronics Engineering | it_IT |
dc.subject.isicrui | Ingegneria industriale e dell'informazione | - |
dc.subject.anagraferoma3 | Ingegneria industriale e dell'informazione | it_IT |
local.test | test | - |
dc.description.romatrecurrent | Dipartimento di Ingegneria elettronica | * |
item.grantfulltext | restricted | - |
item.languageiso639-1 | other | - |
item.fulltext | With Fulltext | - |
Appears in Collections: | X_Dipartimento di Ingegneria elettronica T - Tesi di dottorato |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FragileWatermarkingTechniquesforImageAuthentication.pdf | 1.58 MB | Adobe PDF | View/Open |
Page view(s)
161
Last Week
0
0
Last month
0
0
checked on Nov 21, 2024
Download(s)
198
checked on Nov 21, 2024
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.