ABSTRACT
Image authentication is a process of verify the originality of an image by detecting malicious manipulations. It is important in content delivery via entrusted intermediaries, such as peer-to-peer file sharing. Many differently encoded versions of the original image might exist. We propose an approach using distributed source coding using mean projection and LDPC encoding method for the image authentication problem. The key idea is to provide mean projection and LDPC encoded quantized image projection as authentication data. This version can be correctly decoded with the help of an authentic image as side information. Distributed source coding provides the desired robustness against legitimate variations while detecting illegitimate modification. The decoder incorporating mean projection and LDPC algorithms can authenticate images which have undergone contrast, brightness, and affine warping adjustments.
- Yao-Chung Lin Dept. of Elect. Eng., Stanford Univ., Stanford, CA, USA Varodayan D., Girod, B. "Image Authentication using dsc" IEEE transactional paper, Dec 2011Google Scholar
- J. J. Eggers and B. Girod, "watermarking applied to image authentication," in IEEE Int. Conf. on Acoust., Speech, Signal Processing, Salt Lake City, UT, May 2008.Google Scholar
- R. B. Wolfgang and E. J. Delp, "A watermark for digital images," in IEEE Int. Conf. on Image Processing, Lausanne, Switzerland, Sep. 1996.Google Scholar
- C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153--168, 2001. Google ScholarDigital Library
- C.-S. Liu and H.-Y. M. Liao, "Structural digital signature for image authentication: an incidental distortion resistant scheme," IEEE Trans. Multimedia, vol. 5, no. 2, pp. 161--173, 2003. Google ScholarDigital Library
- W. Diffie and M. E. Hellman, "New directions in cryptography," IEEETrans. Inform. Theory, vol. 22, no. 6, pp. 644--654, 1976. Google ScholarDigital Library
- D. Varodayan, A. Aaron, and B. Girod, "Rate-adaptive codes for distributed source coding," EURASIP Signal Processing J., vol. 86, no. 11, pp. 3123--3130, 2006. Google ScholarDigital Library
- D. Slepian and J. K. Wolf, "Noiseless coding of correlated information sources," IEEE Trans. Inform. Theory, vol. 19, no. 4, pp. 471--480, 1973. Google ScholarDigital Library
- Ziv codec for video," in SPIE Visual Communications and Image Processing Conf., San Jose, CA, Jan. 2004.Google Scholar
- D. Varodayan, A. Mavlankar, M Flierl, and B. Girod, "Distributed grayscale stero image coding with unsupervised learning of disparity," in IEEE Data Compression Conf., Snowbird, UT, March 2007. Google ScholarDigital Library
- A. Aaron, D. Varodayan, and B. Girod. Wyner-Ziv residual coding of video. In Picture Coding Symposium, Beijing, China, December 2006.Google Scholar
- F. Ahmed and M. Y. Siyal. A secure and robust hashing scheme for image authentication. In Information, Communications and Signal Processing, 2005Google Scholar
- D. Chen, D. Varodayan, M. Flierl, and B. Girod. Distributed stereo image coding with improved disparity and noise estimation. In IEEE International Conference on Acoustics, Speech, and Signal Processing, Las Vegas, NV, March 2008.Google ScholarCross Ref
- N.-M. Cheung and A. Ortega. Flexible video decoding: A distributed source coding approach. In IEEE International Workshop on Multimedia Signal Processing, Crete, Greece, October 2007.Google ScholarCross Ref
- K. Chono, Y.-C. Lin, D. Varodayan, Y. Miyamoto, and B. Girod. Reduced reference image quality assessment using distributed source coding. In IEEE International Conference on Multimedia and Expo, April 2008Google Scholar
Secure image authentication by distibuted source coding using LDPC encoding
Recommendations
Image authentication using distributed arithmetic coding
Image authentication using distributed arithmetic coding (DAC) is studied in this paper. The quantized random projections of the original image are compressed by a DAC encoder and the codeword is taken as the authentication data. With the help of a ...
Distributed source coding authentication of images with contrast and brightness adjustment and affine warping
PCS'09: Proceedings of the 27th conference on Picture Coding SymposiumMedia authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to ...
Wave atom transform based image hashing using distributed source coding
To reduce the size of hash code and enhance the security of wave atom transform (WAT) based image authentication system, a low-density parity-check code based distributed source coding (DSC) is employed to compress the hash code. With the help of a ...
Comments