Toward a Robust Image Authentication Method Surviving JPEG Lossy Compression
نویسندگان
چکیده
This paper presents a robust image authentication approach that distinguishes malicious attacks from JPEG lossy compression. The authentication procedure calculates the relationships between important DCT coefficients in each pair of DCT blocks and predefined thresholds to form the authentication message, and then embeds the encryption of the authenticated message into other DCT coefficients. The message calculation and embedding procedure are based on two proposed quantization properties that always exist under different JPEG quantization tables. Therefore, the proposed image authentication approach can tolerate JPEG compression efficiently. Experimental results demonstrate the effectiveness of the proposed image authentication approach.
منابع مشابه
Robust Image Authentication Method Surviving JPEG Lossy Compression
Image authentication veriies the originality of an image by detecting malicious manipulations. This goal is diierent from that of image watermarking which embeds into the image a signature surviving most manipulations. Existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some applications demand techniques that can distinguish accep...
متن کاملA robust image authentication method distinguishing JPEG compression from malicious manipulation
Image authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some practical applications demand techniques that can ...
متن کاملA DCT-Based Secure JPEG Image Authentication Scheme
The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that is tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding ...
متن کاملDigital Color Images Ownership Authentication via Efficient and Robust Watermarking in a Hybrid Domain
We propose an efficient, imperceptible and highly robust digital watermarking scheme applied to color images for ownership authentication purposes. A hybrid domain for embedding the same watermark is used in this algorithm, which is composed by a couple of watermarking techniques based on spread spectrum and frequency domain. The visual quality is measured by three metrics called Peak Signal to...
متن کاملApply Semi-fragile Watermarking to Authentication of Compressed Video Data
This paper proposes an effective technique, which can detect malicious manipulations under video lossy compressing data (e.g. H.263) and still-image lossy compressing data (e.g. JPEG). A blockclassification strategy is used to divide DCT-blocks into the flat-blocks and the normal-blocks. Simple features of the both blocks are embedded invisibly. For later authentication, the watermarked frame i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 23 شماره
صفحات -
تاریخ انتشار 2007