Compression Tolerant Image Authentication

نویسندگان

  • Sushil K. Bhattacharjee
  • Martin Kutter
چکیده

It is straightforward to apply general schemes for authenticating digital data to the problem of authenticating digital images. However, such a scheme would not authenticate images that have undergone lossy compression, even though they may not have been manipulated otherwise. In this paper we propose a scheme for authenticating the visual content of digital images. This scheme is robust to compression noise, but will detect deliberate manipulation of the image-data. The proposed scheme is based on the extraction of featurepoints from the image. These feature-points are de ned so as to be relatively una ected by lossy compression. The set of feature-points from a given image is encrypted using public key encryption, to generate the digital signature of the image. Authenticity is veri ed by comparing the feature-points of the image in question, with those recovered from the previously computed digital signature.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A DCT-Based Secure JPEG Image Authentication Scheme

The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding ...

متن کامل

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

Intelligent Watermarking Scheme for image Authentication and Recovery

Recently, researchers have proposed semi-fragile watermarking techniques with the additional capability of image recovery. However, these approaches have certain limitations with respect to capacity, imperceptibility, and robustness. In this paper, we are proposing two independent watermarks, one for image recovery and the other for authentication. The first watermark (image digest), a highly c...

متن کامل

Compression Tolerant Watermarking for Image Verification

Digital Watermarking is seen as a viable solution to authentication of multimedia data and hence its security, especially in a networked environment. In this paper we present a new watermarking technique to add a code to digital images in spatial domain. This technique is further shown to be robust under common compression schemes, including lossy compression schemes. Watermark embedding is don...

متن کامل

Compression Tolerant DCT Based Image Hash

With the advent of Internet image authentication has become a central part of research in security. Since JPEG has recommended discrete cosine transform as one of the steps in image compression systems, a hash function which utilizes discrete cosine decomposition is desirable. In this paper, we propose a discrete cosine based hash function which distinguishes acceptable level of compression fro...

متن کامل

Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization

There is a great adventure of watermarking usage in the context of conventional authentication since it does not require additional storage space for supplementary metadata. However JPEG compression, being a conventional method to compress images, leads to exact authentication breaking. We discuss a semi-fragile watermarking system for digital images tolerant to JPEG/JPEG2000 compression. Recen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998