Off-line authentication using watermarks

Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In this paper, we propose a new method for the secure and practical watermarking system. This method is designed to use printed images in the off-line authentication, where one determines whether a printed image has been altered intentionally since the first printing time, perhaps by a malicious party. This system is based on the fragile watermarking technologies to detect the transforms such as PS(printing and scanning) distortions, slight rotations and croppings, etc. With the human visual system, this watermarking system can detect the watermark in a image with random noises and can be applied for the practical use.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings
EditorsKwangjo Kim
PublisherSpringer Verlag
Pages200-213
Number of pages14
ISBN (Print)3540433198, 9783540433194
DOIs
Publication statusPublished - 2002 Jan 1
Event4th International Conference on Information Security and Cryptology, ICISC 2001 - Seoul, Korea, Republic of
Duration: 2001 Dec 62001 Dec 7

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2288
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Information Security and Cryptology, ICISC 2001
CountryKorea, Republic of
CitySeoul
Period01/12/601/12/7

Keywords

  • E-commerce
  • Off-line authentication
  • PS distortion
  • PSP distortion

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Off-line authentication using watermarks'. Together they form a unique fingerprint.

  • Cite this

    Yoo, H., Lee, K., Lee, S., & Lim, J. (2002). Off-line authentication using watermarks. In K. Kim (Ed.), Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings (pp. 200-213). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2288). Springer Verlag. https://doi.org/10.1007/3-540-45861-1_16