• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

A robust image authentication method surviving JPEG lossy compression,” SPIE (1998)

by C Y Lin, S F Chang
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 34
Next 10 →

A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation

by Ching-yung Lin, Shih-fu Chang , 1997
"... Abstract—Image authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing methods for image authentication treat all types of mani ..."
Abstract - Cited by 105 (13 self) - Add to MetaCart
Abstract—Image authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some practical applications demand techniques that can distinguish acceptable manipulations (e.g., compression) from malicious ones. In this paper, we present an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression. The authentication signature is based on the invariance of the relationships between discrete cosine transform (DCT) coefficients at the same position in separate blocks of an image. These relationships are preserved when DCT coefficients are quantized in JPEG compression. Our proposed method can distinguish malicious manipulations from JPEG lossy compression regardless of the compression ratio or the number of compression iterations. We describe adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling. We also present theoretical and experimental results to demonstrate the effectiveness of the technique. Index Terms—Authentication, digital signature, integrity, JPEG, manipulation, security.

Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme

by Chun-Shien Lu, Hong-yuan Mark Liao - IEEE Trans. on Multimedia , 2000
"... The existing digital data verification methods are able to detect regions that have been tampered with, but are too fragile to resist incidental manipulations. This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construc ..."
Abstract - Cited by 83 (14 self) - Add to MetaCart
The existing digital data verification methods are able to detect regions that have been tampered with, but are too fragile to resist incidental manipulations. This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construct a structural digital signature (SDS) for image authentication. The characteristic of the SDS is that it can tolerate content-preserving modifications while detecting content-changing modifications. Many incidental manipulations, which were detected as malicious modifications in the previous digital signature verification or fragile watermarking schemes, can be bypassed in the proposed scheme. Performance analysis is conducted and experimental results show that the new scheme is indeed superb for image authentication. keywords: Digital signature, Wavelet transform, Authentication, Fragility, Robustness. The preliminary version of this paper will be published in [14] (http://smart.iis.sinica.ed...
(Show Context)

Citation Context

... to have a small standard deviation ae I while a malicious tampering tends to have a large standard deviation ae M , i.e., ae I ! ae M . Some reference values regarding ae I and ae M were provided in =-=[7]-=- for a specific image. Based on our scheme, a structural digital signature is constructed by selecting those parent-child pairs whose differences in magnitudes are larger than oe. The difference in ma...

Multipurpose Watermarking for Image Authentication and Protection

by Chun-Shien Lu, Hong-yuan Mark Liao - IEEE Transactions on Image Processing , 2001
"... We propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host image's wavelet coefficients as masking threshold units (MTUs), two complementary watermarks are emb ..."
Abstract - Cited by 71 (7 self) - Add to MetaCart
We propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host image's wavelet coefficients as masking threshold units (MTUs), two complementary watermarks are embedded using cocktail watermarking and they can be blindly extracted without access to the host image. For the purpose of image protection, the new scheme guarantees that, no matter what kind of attack is encountered, at least one watermark can survive well. On the other hand, for the purpose of image authentication, our approach can locate the part of the image that has been changed and tolerate some incidental processes that have been executed. Experimental results show that the performance of our multipurpose watermarking scheme is indeed superb in terms of robustness and fragility. Keywords: Robust watermarking, Copyright protection, Fragile watermarking, Authentication. 1 1 Introduction C...
(Show Context)

Citation Context

...opyright marking is a relatively new technique used for hiding multimedia information [24]. Its application is broad, including ownership protection [3, 7, 17, 18, 19, 25, 30], content authentication =-=[8, 9, 13, 15, 32, 34, 35]-=-, side information conveyance [22], and so on. For ownership protection, robustness is one of the major points of concern [18, 19]. Watermarks embedded for this purpose are called robust watermarks. F...

Generating Robust Digital Signature for Image/Video Authentication

by Ching-yung Lin, Shih-fu Chang - Multimedia and Security Workshop at ACM Multimedia , 1998
"... Image/video authentication techniques protect the recipients against malicious forgery. In this paper, we describe an image authentication technique that verifies the originality of the received images. The authentication signature can distinguish content-changing manipulations (such as pixel replac ..."
Abstract - Cited by 25 (2 self) - Add to MetaCart
Image/video authentication techniques protect the recipients against malicious forgery. In this paper, we describe an image authentication technique that verifies the originality of the received images. The authentication signature can distinguish content-changing manipulations (such as pixel replacing) from content-preserving manipulations (such as JPEG compression). We also propose a video authentication method that generates robust signatures for compressed video. The signatures can survive some of the transcoding process of MPEG.

A new semi-fragile image authentication framework combining

by Qibin Sun, Shih-fu Chang, Maeno Kurato, Masayuki Suto - ECC and PKI infrastructure,” ISCAS2002, Phoneix , 2002
"... This paper presents a new semi-fragile framework aiming at extending public key signature scheme from message level to content level. The content signing procedure includes signature generation and watermark embedding while the content authentication procedure includes watermark extraction and signa ..."
Abstract - Cited by 24 (5 self) - Add to MetaCart
This paper presents a new semi-fragile framework aiming at extending public key signature scheme from message level to content level. The content signing procedure includes signature generation and watermark embedding while the content authentication procedure includes watermark extraction and signature verification. One main unique contribution is the novel use of error correction coding (ECC) to address the incidental distortions caused by some acceptable manipulations such as lossy compression. Another unique feature is integration of PKI security infrastructure and the hashing mechanism to achieve security and short signatures/watermarks. In the signing procedure, block-based invariant features are extracted from the image content and then encoded by ECC to obtain their corresponding parity check bits (PCB). All PCBs are then embedded back into image as watermarks for the purpose of authentication and locating content alteration. In addition, codewords are concatenated, hashed and finally signed by content owner’s private key to generate a global cryptographic signature. The authentication procedure is the inverse procedure of signing except using content owner’s public key for signature verification. After describing the proposed algorithm in details, an implementation example is given by combining our system with invariant features explored in earlier systems.
(Show Context)

Citation Context

...d the corresponding watermarking techniques, the main challenge has been to find "adequate" content features that can be used to distinguish between malicious attacks and acceptable manipula=-=tions. In [2,3]-=-, semi-fragile authentication solutions were developed considering lossy compression as acceptable. In [2], the authors discovered a mathematical invariant relationship between two coefficients in a b...

Issues and Solutions for Authenticating MPEG Video

by Ching-yung Lin, Shih-fu Chang - IEEE International Conference on Acoustics, Speach and Signal Processing , 1999
"... Video authentication techniques are used to prove the originality of received video content and to detect malicious tampering. Existing authentication techniques protect every single bit of the video content and do not allow any form of manipulation. In real applications, this may not be practical. ..."
Abstract - Cited by 18 (4 self) - Add to MetaCart
Video authentication techniques are used to prove the originality of received video content and to detect malicious tampering. Existing authentication techniques protect every single bit of the video content and do not allow any form of manipulation. In real applications, this may not be practical. In several situations, compressed videos need to be further processed to accommodate various application requirements. Examples include bitrate scaling, transcoding, and frame rate conversion. The concept of asking each intermediate processing stage to add authentication codes is awed in practical cases. In this paper, we extend our prior work on JPEG-surviving image authentication techniques to video. We rst discuss issues of authenticating MPEG videos under various transcoding situations, including dynamic rate shaping, requantization, frame type conversion, and re-encoding. Di erent situations pose di erent technical challenges in developing robust authentication techniques. In the second part of this paper, we propose a robust video authentication system which accepts some MPEG transcoding processes but is able to detect malicious manipulations. It is based on unique invariant properties of the transcoding processes. Digital signature techniques as well as public key methods are used in our robust video authentication system.
(Show Context)

Citation Context

...d and re-interpreted by many interim entities. Then, it will be important to reduce the necessary number of endorsers. That can be achieved by the robust digital signature method that we have proposed=-=[7, 8, 10]-=-. The robust digital signature is used for the purpose of multimedia content authentication which we will discuss in the next section. 1.2 Multimedia Authentication Objectives: Complete Verification v...

photographic images and photorealistic computer graphics dataset

by Tian-tsong Ng, Shih-fu Chang, Jessie Hsu, Martin Pepeljugoski , 2005
"... Passive-blind image authentication is a new area of research. A suitable dataset for experimentation and comparison of new techniques is important for the progress of the new research area. In response to the need for a new dataset, the Columbia Photographic Images and Photorealistic Computer Graphi ..."
Abstract - Cited by 16 (6 self) - Add to MetaCart
Passive-blind image authentication is a new area of research. A suitable dataset for experimentation and comparison of new techniques is important for the progress of the new research area. In response to the need for a new dataset, the Columbia Photographic Images and Photorealistic Computer Graphics Dataset is made open for the passive-blind image authentication research community. The dataset is composed of four component image sets, i.e., the Photorealistic Computer Graphics Set, the Personal Photographic Image Set, the Google Image Set, and the Recaptured Computer Graphics Set. This dataset, available from
(Show Context)

Citation Context

...e as a user guide for the dataset. 1 Introduction Digital watermarking [1] has been an active area of research since a decade ago. Various fragile [2, 3, 4, 5] or semi-fragile watermarking algorithms =-=[6, 7, 8, 9]-=- has been proposed for the image content authentication and the detection of image tampering. In addition, authentication signature [10, ∗ This work was done when Martin spent his summer in our resear...

Digital fragile watermarking scheme for authentication of JPEG images

by Chang-tsun Li - Proc. of IEE on Vision, Image and Signal Processing , 2004
"... It is a common practice in transform-do main fragile watermarking schemes for authentication purposes to watermark some selected transform coefficients so as to minimise embedding distortion. However, we point out in this work that leaving most of the coefficients unmarked results in a wide-open sec ..."
Abstract - Cited by 13 (4 self) - Add to MetaCart
It is a common practice in transform-do main fragile watermarking schemes for authentication purposes to watermark some selected transform coefficients so as to minimise embedding distortion. However, we point out in this work that leaving most of the coefficients unmarked results in a wide-open security gap for attacks to be mounted on them. A fragile watermarking scheme is proposed to implicitly watermark all the coefficients by registering the zero-valued coefficients with a key-generated binary sequence to create the watermark and involving the unwatermarkable coefficients during the embedding process of the embeddable ones. Non-deterministic dependence is established by involving some of the unwatermarkable coefficients selected according to the watermark from a 9-neighbourhood system in order to thwart different attacks such as cover-up, vector quantisation, and transplantation. No hashing and cryptography are needed in establishing the non-deterministic dependence.
(Show Context)

Citation Context

...acks are mounted on its host media so that alarms can be raised when wrong watermark is extracted. Therefore, the emphasis of the fragile watermarking schemes is focused on the sensitivity to attacks =-=[11, 19]-=- or even incidental manipulations in some cases [1, 8, 9, 20]. To be considered effective, a fragile watermarking scheme must meet the common requirements such as localising tampering, detecting geome...

A Semi-Fragile Watermark Scheme for Image Authentication

by Xiang Zhou, Xiaohui Duan, Daoxian Wang - IEEE International Conference on Multimedia Modeling , 2004
"... In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed, which addresses the issue of protecting images from illegal manipulations and modifications. The scheme extracts a signature (watermark) from the original image and inserts this signature back into the imag ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed, which addresses the issue of protecting images from illegal manipulations and modifications. The scheme extracts a signature (watermark) from the original image and inserts this signature back into the image, avoiding additional signature files. The error correction coding (ECC) is used to encode the signatures that are extracted from the image. To increase the security of this scheme, user’s private key is employed for encryption and decryption of the watermark during watermark extraction and insertion procedures. Experimental result shows that if there is no change in the obtained image, the watermark will be correctly extracted, thus will pass through the authentication system. This scheme is tolerant of lossy compression such as JPEG, but malicious changes of the image will result in the breach of the watermark detection. In addition, this scheme can detect the exact locations, which are illegal modified blocks.
(Show Context)

Citation Context

...pairs of the points in [5]. Chen and Wang extract the content-dependent robust bits as the signature from spatial domain and insert this signature into the wavelet coefficients in [6]. The same as in =-=[7]-=-, to survive after conventional compression JPEG compression, in an image authentication system, Lin and Chang proposed a method to preserve the invariance between the DCT coefficients before and afte...

A crypto signature scheme for image authentication over wireless channel

by Qibin Sun, Shuiming Ye, Ching-yung Lin, Shih-fu Chang - International Journal of Image and Graphics , 2005
"... With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking ..."
Abstract - Cited by 10 (6 self) - Add to MetaCart
With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic signature scheme to make the digital signatures robust to these image degradations. Due to the unpredictable degradations, the pre-processing and block shuffling techniques are applied onto the image at the signing end to stabilize the feature extracted at the verification end. The proposed approach is compatible with traditional cryptographic signature scheme except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results.
(Show Context)

Citation Context

...lock-based pre-processing. (2) Extract the DCT features andgenerate the watermarks; Shuffle image blocks andselect the blocks for watermarking. (3) Embedthe watermarks andobtain the watermarkedimage. =-=(4)-=- Cryptographically hash the extractedfeatures, generate the cryptographic signature by the image sender’s private key. (5) Sendthe watermarkedimage andits associatedcryptographic signature to the reci...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University