Results 1 - 10
of
34
A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation
, 1997
"... Abstract—Image authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing methods for image authentication treat all types of mani ..."
Abstract
-
Cited by 105 (13 self)
- Add to MetaCart
Abstract—Image authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some practical applications demand techniques that can distinguish acceptable manipulations (e.g., compression) from malicious ones. In this paper, we present an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression. The authentication signature is based on the invariance of the relationships between discrete cosine transform (DCT) coefficients at the same position in separate blocks of an image. These relationships are preserved when DCT coefficients are quantized in JPEG compression. Our proposed method can distinguish malicious manipulations from JPEG lossy compression regardless of the compression ratio or the number of compression iterations. We describe adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling. We also present theoretical and experimental results to demonstrate the effectiveness of the technique. Index Terms—Authentication, digital signature, integrity, JPEG, manipulation, security.
Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme
- IEEE Trans. on Multimedia
, 2000
"... The existing digital data verification methods are able to detect regions that have been tampered with, but are too fragile to resist incidental manipulations. This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construc ..."
Abstract
-
Cited by 83 (14 self)
- Add to MetaCart
(Show Context)
The existing digital data verification methods are able to detect regions that have been tampered with, but are too fragile to resist incidental manipulations. This paper proposes a new digital signature scheme which makes use of an image's contents (in the wavelet transform domain) to construct a structural digital signature (SDS) for image authentication. The characteristic of the SDS is that it can tolerate content-preserving modifications while detecting content-changing modifications. Many incidental manipulations, which were detected as malicious modifications in the previous digital signature verification or fragile watermarking schemes, can be bypassed in the proposed scheme. Performance analysis is conducted and experimental results show that the new scheme is indeed superb for image authentication. keywords: Digital signature, Wavelet transform, Authentication, Fragility, Robustness. The preliminary version of this paper will be published in [14] (http://smart.iis.sinica.ed...
Multipurpose Watermarking for Image Authentication and Protection
- IEEE Transactions on Image Processing
, 2001
"... We propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host image's wavelet coefficients as masking threshold units (MTUs), two complementary watermarks are emb ..."
Abstract
-
Cited by 71 (7 self)
- Add to MetaCart
(Show Context)
We propose a novel multipurpose watermarking scheme, in which robust and fragile watermarks are simultaneously embedded, for copyright protection and content authentication. By quantizing a host image's wavelet coefficients as masking threshold units (MTUs), two complementary watermarks are embedded using cocktail watermarking and they can be blindly extracted without access to the host image. For the purpose of image protection, the new scheme guarantees that, no matter what kind of attack is encountered, at least one watermark can survive well. On the other hand, for the purpose of image authentication, our approach can locate the part of the image that has been changed and tolerate some incidental processes that have been executed. Experimental results show that the performance of our multipurpose watermarking scheme is indeed superb in terms of robustness and fragility. Keywords: Robust watermarking, Copyright protection, Fragile watermarking, Authentication. 1 1 Introduction C...
Generating Robust Digital Signature for Image/Video Authentication
- Multimedia and Security Workshop at ACM Multimedia
, 1998
"... Image/video authentication techniques protect the recipients against malicious forgery. In this paper, we describe an image authentication technique that verifies the originality of the received images. The authentication signature can distinguish content-changing manipulations (such as pixel replac ..."
Abstract
-
Cited by 25 (2 self)
- Add to MetaCart
Image/video authentication techniques protect the recipients against malicious forgery. In this paper, we describe an image authentication technique that verifies the originality of the received images. The authentication signature can distinguish content-changing manipulations (such as pixel replacing) from content-preserving manipulations (such as JPEG compression). We also propose a video authentication method that generates robust signatures for compressed video. The signatures can survive some of the transcoding process of MPEG.
A new semi-fragile image authentication framework combining
- ECC and PKI infrastructure,” ISCAS2002, Phoneix
, 2002
"... This paper presents a new semi-fragile framework aiming at extending public key signature scheme from message level to content level. The content signing procedure includes signature generation and watermark embedding while the content authentication procedure includes watermark extraction and signa ..."
Abstract
-
Cited by 24 (5 self)
- Add to MetaCart
(Show Context)
This paper presents a new semi-fragile framework aiming at extending public key signature scheme from message level to content level. The content signing procedure includes signature generation and watermark embedding while the content authentication procedure includes watermark extraction and signature verification. One main unique contribution is the novel use of error correction coding (ECC) to address the incidental distortions caused by some acceptable manipulations such as lossy compression. Another unique feature is integration of PKI security infrastructure and the hashing mechanism to achieve security and short signatures/watermarks. In the signing procedure, block-based invariant features are extracted from the image content and then encoded by ECC to obtain their corresponding parity check bits (PCB). All PCBs are then embedded back into image as watermarks for the purpose of authentication and locating content alteration. In addition, codewords are concatenated, hashed and finally signed by content owner’s private key to generate a global cryptographic signature. The authentication procedure is the inverse procedure of signing except using content owner’s public key for signature verification. After describing the proposed algorithm in details, an implementation example is given by combining our system with invariant features explored in earlier systems.
Issues and Solutions for Authenticating MPEG Video
- IEEE International Conference on Acoustics, Speach and Signal Processing
, 1999
"... Video authentication techniques are used to prove the originality of received video content and to detect malicious tampering. Existing authentication techniques protect every single bit of the video content and do not allow any form of manipulation. In real applications, this may not be practical. ..."
Abstract
-
Cited by 18 (4 self)
- Add to MetaCart
(Show Context)
Video authentication techniques are used to prove the originality of received video content and to detect malicious tampering. Existing authentication techniques protect every single bit of the video content and do not allow any form of manipulation. In real applications, this may not be practical. In several situations, compressed videos need to be further processed to accommodate various application requirements. Examples include bitrate scaling, transcoding, and frame rate conversion. The concept of asking each intermediate processing stage to add authentication codes is awed in practical cases. In this paper, we extend our prior work on JPEG-surviving image authentication techniques to video. We rst discuss issues of authenticating MPEG videos under various transcoding situations, including dynamic rate shaping, requantization, frame type conversion, and re-encoding. Di erent situations pose di erent technical challenges in developing robust authentication techniques. In the second part of this paper, we propose a robust video authentication system which accepts some MPEG transcoding processes but is able to detect malicious manipulations. It is based on unique invariant properties of the transcoding processes. Digital signature techniques as well as public key methods are used in our robust video authentication system.
photographic images and photorealistic computer graphics dataset
, 2005
"... Passive-blind image authentication is a new area of research. A suitable dataset for experimentation and comparison of new techniques is important for the progress of the new research area. In response to the need for a new dataset, the Columbia Photographic Images and Photorealistic Computer Graphi ..."
Abstract
-
Cited by 16 (6 self)
- Add to MetaCart
(Show Context)
Passive-blind image authentication is a new area of research. A suitable dataset for experimentation and comparison of new techniques is important for the progress of the new research area. In response to the need for a new dataset, the Columbia Photographic Images and Photorealistic Computer Graphics Dataset is made open for the passive-blind image authentication research community. The dataset is composed of four component image sets, i.e., the Photorealistic Computer Graphics Set, the Personal Photographic Image Set, the Google Image Set, and the Recaptured Computer Graphics Set. This dataset, available from
Digital fragile watermarking scheme for authentication of JPEG images
- Proc. of IEE on Vision, Image and Signal Processing
, 2004
"... It is a common practice in transform-do main fragile watermarking schemes for authentication purposes to watermark some selected transform coefficients so as to minimise embedding distortion. However, we point out in this work that leaving most of the coefficients unmarked results in a wide-open sec ..."
Abstract
-
Cited by 13 (4 self)
- Add to MetaCart
(Show Context)
It is a common practice in transform-do main fragile watermarking schemes for authentication purposes to watermark some selected transform coefficients so as to minimise embedding distortion. However, we point out in this work that leaving most of the coefficients unmarked results in a wide-open security gap for attacks to be mounted on them. A fragile watermarking scheme is proposed to implicitly watermark all the coefficients by registering the zero-valued coefficients with a key-generated binary sequence to create the watermark and involving the unwatermarkable coefficients during the embedding process of the embeddable ones. Non-deterministic dependence is established by involving some of the unwatermarkable coefficients selected according to the watermark from a 9-neighbourhood system in order to thwart different attacks such as cover-up, vector quantisation, and transplantation. No hashing and cryptography are needed in establishing the non-deterministic dependence.
A Semi-Fragile Watermark Scheme for Image Authentication
- IEEE International Conference on Multimedia Modeling
, 2004
"... In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed, which addresses the issue of protecting images from illegal manipulations and modifications. The scheme extracts a signature (watermark) from the original image and inserts this signature back into the imag ..."
Abstract
-
Cited by 12 (0 self)
- Add to MetaCart
(Show Context)
In this paper, a novel semi-fragile watermarking scheme for image authentication is proposed, which addresses the issue of protecting images from illegal manipulations and modifications. The scheme extracts a signature (watermark) from the original image and inserts this signature back into the image, avoiding additional signature files. The error correction coding (ECC) is used to encode the signatures that are extracted from the image. To increase the security of this scheme, user’s private key is employed for encryption and decryption of the watermark during watermark extraction and insertion procedures. Experimental result shows that if there is no change in the obtained image, the watermark will be correctly extracted, thus will pass through the authentication system. This scheme is tolerant of lossy compression such as JPEG, but malicious changes of the image will result in the breach of the watermark detection. In addition, this scheme can detect the exact locations, which are illegal modified blocks.
A crypto signature scheme for image authentication over wireless channel
- International Journal of Image and Graphics
, 2005
"... With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking ..."
Abstract
-
Cited by 10 (6 self)
- Add to MetaCart
(Show Context)
With the ambient use of digital images and the increasing concern on their integrity and originality, consumers are facing an emergent need of authenticating degraded images despite lossy compression and packet loss. In this paper, we propose a scheme to meet this need by incorporating watermarking solution into traditional cryptographic signature scheme to make the digital signatures robust to these image degradations. Due to the unpredictable degradations, the pre-processing and block shuffling techniques are applied onto the image at the signing end to stabilize the feature extracted at the verification end. The proposed approach is compatible with traditional cryptographic signature scheme except that the original image needs to be watermarked in order to guarantee the robustness of its derived digital signature. We demonstrate the effectiveness of this proposed scheme through practical experimental results.