A DCT-Based Secure JPEG Image Authentication Scheme

نویسندگان

  • Mona F. M. Mursi
  • Ghazy M.R. Assassa
  • Hatim A. Aboalsamh
  • Khaled Alghathbar
چکیده

The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that is based on a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the image DCT coefficients, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the image authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting. Keywords—Authentication, DCT, JPEG, Watermarking.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Image Authentication Scheme Based on Correlation

This paper proposes a watermarking algorithm based on correlation to authenticate image content. The original image is converted to YIQ space first, then subdivided into 8× 8 non-overlapping blocks. DCT transform is executed on each block. The watermark sequence is derived from certain low frequency coefficients. It is hided into the middle frequency DCT coefficients of another pseudo-randomly ...

متن کامل

The Achilles’ Heel of Jpeg-based Image Authentication

Many image authentication systems in the DCT domain rely on the two invariant properties of the JPEG compression algorithm, which were found out by Lin and Chang. Based on these two assumptions, the authors of these authentication systems utilize that lossy JPEG compression to a pre-defined quality factor always yields the same relationships of coefficients, which can be used to generate image ...

متن کامل

A Public Key Watermarking Scheme for Image Authentication

Conventional digital signature schemes for image authentication encode the signature in a file separate from the original image, thus require extra bandwidth to transmit it. Watermarking techniques embed some information in the host image. In this paper, a public key based digital signature scheme for image authentication is proposed. The scheme extracts feature value from the pixels of the of ...

متن کامل

Content based Public Key Watermarking Scheme for Image Verification and Authentication

A semi fragile, public key based digital signature scheme to verify and authenticate digital images is proposed. The scheme computes a content dependent feature value for each block of DCT coefficients of the original image. This feature is signed and then embedded into the selected DCT coefficients of the image as watermark. The technique aims to circumvent the cut and paste attacks by incorpo...

متن کامل

Perceptible Content Retrieval in DCT Domain and Semi-Fragile Watermarking Technique for Perceptible Content Authentication

Digital watermarking was commenced to copyright protection and ownership verification of multimedia data. However the evolution of the watermark focused on different security aspects of multimedia data such as integrity and authenticity. Fragile and semi-fragile watermarking schemes were introduced to accomplish these requirements. In this paper, we propose semi-fragile watermarking scheme to a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009