skip to main content
10.1145/2393216.2393344acmotherconferencesArticle/Chapter ViewAbstractPublication PagesccseitConference Proceedingsconference-collections
research-article

Secure image authentication by distibuted source coding using LDPC encoding

Published:26 October 2012Publication History

ABSTRACT

Image authentication is a process of verify the originality of an image by detecting malicious manipulations. It is important in content delivery via entrusted intermediaries, such as peer-to-peer file sharing. Many differently encoded versions of the original image might exist. We propose an approach using distributed source coding using mean projection and LDPC encoding method for the image authentication problem. The key idea is to provide mean projection and LDPC encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating mean projection and LDPC algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments.

References

  1. Yao-Chung Lin Dept. of Elect. Eng., Stanford Univ., Stanford, CA, USA Varodayan D., Girod, B. "Image Authentication using dsc" IEEE transactional paper, Dec 2011Google ScholarGoogle Scholar
  2. J. J. Eggers and B. Girod, "watermarking applied to image authentication," in IEEE Int. Conf. on Acoust., Speech, Signal Processing, Salt Lake City, UT, May 2008.Google ScholarGoogle Scholar
  3. R. B. Wolfgang and E. J. Delp, "A watermark for digital images," in IEEE Int. Conf. on Image Processing, Lausanne, Switzerland, Sep. 1996.Google ScholarGoogle Scholar
  4. C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153--168, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C.-S. Liu and H.-Y. M. Liao, "Structural digital signature for image authentication: an incidental distortion resistant scheme," IEEE Trans. Multimedia, vol. 5, no. 2, pp. 161--173, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. W. Diffie and M. E. Hellman, "New directions in cryptography," IEEETrans. Inform. Theory, vol. 22, no. 6, pp. 644--654, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Varodayan, A. Aaron, and B. Girod, "Rate-adaptive codes for distributed source coding," EURASIP Signal Processing J., vol. 86, no. 11, pp. 3123--3130, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inform. Theory, vol. 19, no. 4, pp. 471--480, 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ziv codec for video," in SPIE Visual Communications and Image Processing Conf., San Jose, CA, Jan. 2004.Google ScholarGoogle Scholar
  10. D. Varodayan, A. Mavlankar, M Flierl, and B. Girod, "Distributed grayscale stero image coding with unsupervised learning of disparity," in IEEE Data Compression Conf., Snowbird, UT, March 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Aaron, D. Varodayan, and B. Girod. Wyner-Ziv residual coding of video. In Picture Coding Symposium, Beijing, China, December 2006.Google ScholarGoogle Scholar
  12. F. Ahmed and M. Y. Siyal. A secure and robust hashing scheme for image authentication. In Information, Communications and Signal Processing, 2005Google ScholarGoogle Scholar
  13. D. Chen, D. Varodayan, M. Flierl, and B. Girod. Distributed stereo image coding with improved disparity and noise estimation. In IEEE International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, NV, March 2008.Google ScholarGoogle ScholarCross RefCross Ref
  14. N.-M. Cheung and A. Ortega. Flexible video decoding: A distributed source coding approach. In IEEE International Workshop on Multimedia Signal Processing, Crete, Greece, October 2007.Google ScholarGoogle ScholarCross RefCross Ref
  15. K. Chono, Y.-C. Lin, D. Varodayan, Y. Miyamoto, and B. Girod. Reduced reference image quality assessment using distributed source coding. In IEEE International Conference on Multimedia and Expo, April 2008Google ScholarGoogle Scholar
  1. Secure image authentication by distibuted source coding using LDPC encoding

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          CCSEIT '12: Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
          October 2012
          800 pages
          ISBN:9781450313100
          DOI:10.1145/2393216

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 October 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
        • Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader