Computer Generated Hologram for SemiFragile Watermarking with Encrypted Images

The protection of the contents of digital products is referred to as content authentication. In some applications, to be able to authenticate a digital product could be extremely essential. For example, if a digital product is used as a piece of evidence in the court, its integrity could mean life or death of the accused. Generally, the problem of content authentication can be solved using semifragile digital watermarking techniques. Recently many authors have proposed Computer Generated Hologram Watermarking (CGHWatermarking) techniques. Starting from these studies, in this paper a semi-fragile Computer Generated Hologram coding technique is proposed, which is able to detect malicious tampering while tolerating some incidental distortions. The proposed technique uses as watermark an encrypted image, and it is well suitable for digital image authentication.




References:
[1] Y. Aoki, Watermarking Technique Using Computer-Generated
Holograms, Electronics and Communications in Japan, Part 3, 84(1)
(2001) 21-31.
[2] L. Croce Ferri, Visualization of 3D information with digital holography
using laser printers, Computers & Graphics 25(2) (2001) 309-321.
[3] J. Dittmann, L. Croce Ferri, C. Vielhauer, Hologram Watermarks for
Document Authentications, IEEE International Conference on
Information Technology: Coding and Computing, IEEE Computer
Society, Las Vegas, NV, USA, 2-4 April 2001, pp. 60-64.
[4] L. Croce Ferri, A. Mayerhöfer, M. Frank, C. Vielhauer, R. Steinmetz,
Biometric Authentication for ID Cards with Hologram Watermarks,
Proc. SPIE vol. 4675, Photonic West, Security and Watermarking of
multimedia contents IV, San Jose, CA, 19-25 January 2002, pp. 629-
640.
[5] N. Takai and Y. Mifune, Digital watermarking by a holographic
technique, Appl. Opt. 41(5) (2002) 865-873.
[6] G. Schirripa, C. Simonetti and L. Cozzella, Fragile Digital
Watermarking by Synthetic Holograms, Proc. SPIE vol. 5615 European
Symposium on Optics/Fotonics in security & Defence, London, UK, 25-
28 October 2004, pp. 173-182.
[7] G. Schirripa Spagnolo, C. Simonetti, L. Cozzella, Content fragile
watermarking based on computer generated hologram coding technique,
J. Opt. A: Pure Appl. Opt. 7(7) (2005) 333-342.
[8] M.M. Yeung, F.C. Mintzer, Invisible watermarking for image
verification, J. Electronic Imaging 7(3) (1998) 578-591.
[9] P.W. Wong, N. Memon, Secret and Public Key Image Watermarking
Schemes for Image Authentication and Ownership Verification, IEEE
Trans. Image Processing 10(10) (2001) 1593-1601.
[10] N. Memon, P.W. Wong, Protecting digital media content: Watermarks
for copyrighting and authentication, Commun. ACM 41 (1998) 35-43.
[11] L.M. Marnel, C.G. Boncelet Jr., C.T. Retter, Spread spectrum image
steganography, IEEE Trans. on Image Processing (1999) 1075-1083.
[12] E. T. Lin, E. J. Delp, A Review of Fragile Image Watermarks, Proc. of
the Multimedia and Security Workshop (ACM Multimedia '99)
Multimedia Contents, Orlando, FL, October 1999, Orlando, FL, pp. 25-
29.
[13] C. Rey, J.L. Dugelay, A Survey of Watermarking Algorithms for Image
Authentication, EURASIP Journal on Applied Signal Processing 6
(2002) 613-621.
[14] W. R. Lee, Computer Generated Holograms: techniques and
applications, Progress in Optics 16 (1974) 121-231.
[15] NIST FIPS 197 - Advanced Encryption Standard, 26 Nov 2001.
[16] W. Diffe, M. Hellman, New directions in cryptography, IEEE Trans.
Information 22(6) (1976) 644-654.
[17] R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital
signatures and public-key cryptosystems", Communications of the ACM
21(3) (1978) 120-126, 1978.