Skip to main content
Erschienen in: Wireless Personal Communications 1/2015

01.09.2015

Improved Tampering Detection for Image Authentication Based on Image Partitioning

verfasst von: N. M. Masoodhu Banu, S. Sujatha

Erschienen in: Wireless Personal Communications | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper proposes an improved tampering detection algorithm for image authentication, using distributed source coding (DSC) principle, by partitioning the image into N equal clusters, for Slepian-Wolf coding. The proposed DSC based technique for authentication, models the magnitude variation in pixel domain generated by acceptable distortion and illegal tampering as Normal distributions with small and large variances respectively. DSC coding is done for the feature vectors derived from the partitioned image. The feature extraction algorithm is revamped in the aim to produce feature vectors with statistical features well matched to low density parity check (LDPC) codes, designed for the binary symmetric channel (BSC), as the design of LDPC codes for the BSC is intensely investigated and also a well understood topic. The results reveal that, the proposed scheme’s tampering detection is superior than the earlier DSC based techniques.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bhattacharjee, S., & Kutter, M. (1998). Compression tolerant image authentication. IEEE International Conference on Image Processing, Chicago, 1, 4–7. Bhattacharjee, S., & Kutter, M. (1998). Compression tolerant image authentication. IEEE International Conference on Image Processing, Chicago, 1, 4–7.
2.
Zurück zum Zitat Cox, I. J., Kilian, J., Leighton, T., & Shamoon, T. (1996). Secure spread spectrum watermarking for images, audio and video. Proceedings of IEEE International Conference on Image Processing, Lausanne, 3, 243–246.CrossRef Cox, I. J., Kilian, J., Leighton, T., & Shamoon, T. (1996). Secure spread spectrum watermarking for images, audio and video. Proceedings of IEEE International Conference on Image Processing, Lausanne, 3, 243–246.CrossRef
3.
Zurück zum Zitat Eggers, J. J., & Girod, B. (2001). Blind watermarking applied to image authentication. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Salt lake City, UT, 3, 1977–1980. Eggers, J. J., & Girod, B. (2001). Blind watermarking applied to image authentication. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Salt lake City, UT, 3, 1977–1980.
4.
Zurück zum Zitat Wolfgang, R. B., & Delp, E. J. (1996). A watermark for digital images. Proceedings of IEEE International Conference on Image Processing ICASSP, Lausanne, 3, 219–222.CrossRef Wolfgang, R. B., & Delp, E. J. (1996). A watermark for digital images. Proceedings of IEEE International Conference on Image Processing ICASSP, Lausanne, 3, 219–222.CrossRef
5.
Zurück zum Zitat Barni, M., Bartolini, F., Manetti, A., & Piva, A. (2001). A data hiding approach for correcting errors in h.263 video transmitted over a noisy channel. In Proceedings of MMSP01, IEEE workshop on multimedia signal processing, Cannes, pp. 65–70. Barni, M., Bartolini, F., Manetti, A., & Piva, A. (2001). A data hiding approach for correcting errors in h.263 video transmitted over a noisy channel. In Proceedings of MMSP01, IEEE workshop on multimedia signal processing, Cannes, pp. 65–70.
6.
7.
Zurück zum Zitat Fridrich, J. (2000). Visual hash for oblivious watermarking. In Proceedings of SPIE, security and watermarking of multimedia contents II, San Jose, California, USA, pp. 286–294. Fridrich, J. (2000). Visual hash for oblivious watermarking. In Proceedings of SPIE, security and watermarking of multimedia contents II, San Jose, California, USA, pp. 286–294.
8.
Zurück zum Zitat Mihcak, M. K., & Venkatesan, R. (2001).Video watermarking using image hashing. Microsoft Research Technical Report. Mihcak, M. K., & Venkatesan, R. (2001).Video watermarking using image hashing. Microsoft Research Technical Report.
9.
Zurück zum Zitat Ozer, H., Sankur, B., Memon, N., & Anarim, E. (2005). Perceptual audio hashing functions. EURASIP Journal on Applied Signal Processing, 12, 1780–1793.CrossRef Ozer, H., Sankur, B., Memon, N., & Anarim, E. (2005). Perceptual audio hashing functions. EURASIP Journal on Applied Signal Processing, 12, 1780–1793.CrossRef
10.
Zurück zum Zitat Swaminathan, A., Mao, Y., & Wu, M. (2006). Robust and secure image hashing. IEEE Transactions on Information Forensics and Security, 1(2), 215–230.CrossRef Swaminathan, A., Mao, Y., & Wu, M. (2006). Robust and secure image hashing. IEEE Transactions on Information Forensics and Security, 1(2), 215–230.CrossRef
11.
Zurück zum Zitat Mihcak, K., Venkatesan, R., & Liu, T. (2005). Watermarking via optimization algorithms for quantizing randomized semi-global image statistics. ACM Multimedia Systems Journal, 11(2), 185–200.CrossRef Mihcak, K., Venkatesan, R., & Liu, T. (2005). Watermarking via optimization algorithms for quantizing randomized semi-global image statistics. ACM Multimedia Systems Journal, 11(2), 185–200.CrossRef
12.
Zurück zum Zitat Monga, V., & Evans, B. L. (2006). Perceptual image hashing via feature points performance evaluation and trade-offs. IEEE Transactions on Image Processing, 15(11), 3452–3465.CrossRef Monga, V., & Evans, B. L. (2006). Perceptual image hashing via feature points performance evaluation and trade-offs. IEEE Transactions on Image Processing, 15(11), 3452–3465.CrossRef
13.
Zurück zum Zitat Schneider, M., & Chang, S. (1996). Robust content based digital signature for image authentication. In Proceedings of IEEE international. Conference on image processing, (3), Lausanne, pp. 227–230. Schneider, M., & Chang, S. (1996). Robust content based digital signature for image authentication. In Proceedings of IEEE international. Conference on image processing, (3), Lausanne, pp. 227–230.
14.
Zurück zum Zitat Kailasanathan, C., & Safavi Naini, R. (2001). Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation. In Proceedings of IEEE-EURASIP Work. Nonlinear sig. and image processing. Kailasanathan, C., & Safavi Naini, R. (2001). Image authentication surviving acceptable modifications using statistical measures and k-mean segmentation. In Proceedings of IEEE-EURASIP Work. Nonlinear sig. and image processing.
15.
Zurück zum Zitat Venkatesan, R., Koon, S.-M., Jakubowski, M. H., & Moulin, P. (2000). Robust image hashing. Proceedings of IEEE International Conference on. Image Processing, 3, 664–666.CrossRef Venkatesan, R., Koon, S.-M., Jakubowski, M. H., & Moulin, P. (2000). Robust image hashing. Proceedings of IEEE International Conference on. Image Processing, 3, 664–666.CrossRef
16.
Zurück zum Zitat Lin, C. Y., & Chang, S. F. (2001). A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology, 11(2), 153–168.MathSciNetCrossRefMATH Lin, C. Y., & Chang, S. F. (2001). A robust image authentication system distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology, 11(2), 153–168.MathSciNetCrossRefMATH
17.
Zurück zum Zitat Lin, C. Y., & Chang, S. F. (1998). A robust image authentication method surviving JPEG lossy compression. In SPIE conference on storage and retrieval for image and video database, San Jose, CA. Lin, C. Y., & Chang, S. F. (1998). A robust image authentication method surviving JPEG lossy compression. In SPIE conference on storage and retrieval for image and video database, San Jose, CA.
18.
Zurück zum Zitat Lee, J., & Won, C. S. (2000). A watermarking sequence using parities of error control coding for image authentication and correction. IEEE Transactions on Consumer Electronics, 46(2), 313–317.CrossRefMATH Lee, J., & Won, C. S. (2000). A watermarking sequence using parities of error control coding for image authentication and correction. IEEE Transactions on Consumer Electronics, 46(2), 313–317.CrossRefMATH
19.
Zurück zum Zitat Noriega, J. A. M., Kurkoski, B. M., Miyatake, M. N., & Meana, H. P. (2011). Image authentication and recovery using BCH Error-correcting codes. International Journal of Computers, 5(1), 26–33. Noriega, J. A. M., Kurkoski, B. M., Miyatake, M. N., & Meana, H. P. (2011). Image authentication and recovery using BCH Error-correcting codes. International Journal of Computers, 5(1), 26–33.
20.
Zurück zum Zitat Lin, Y. C., Varodayan, D., & Girod, B. (2007). Image authentication based on distributed source coding, In IEEE international conference on image processing, San Antonio, TX, ICIP 2007, Vol.3, III-5-III8. Lin, Y. C., Varodayan, D., & Girod, B. (2007). Image authentication based on distributed source coding, In IEEE international conference on image processing, San Antonio, TX, ICIP 2007, Vol.3, III-5-III8.
21.
Zurück zum Zitat Varodayan, D., Aaron, A., & Girod, B. (2006). Rate-adaptive codes for distributed source coding. EURASIP Signal Processing Journal, Special Section on Distributed Source Coding, 86(11), 3123–3130. Varodayan, D., Aaron, A., & Girod, B. (2006). Rate-adaptive codes for distributed source coding. EURASIP Signal Processing Journal, Special Section on Distributed Source Coding, 86(11), 3123–3130.
22.
Zurück zum Zitat Lin, Y.-C., Varodayan, D., & Girod, B. (2007). Spatial models for localization of image tampering using distributed source codes. Picture Coding Symposium. Lin, Y.-C., Varodayan, D., & Girod, B. (2007). Spatial models for localization of image tampering using distributed source codes. Picture Coding Symposium.
23.
Zurück zum Zitat Lin, Y.-C., Varodayan, D., & Girod, B. (2007). Image authentication and tampering localization using distributed source coding. IEEE Multimedia Signal Processing Workshop. Lin, Y.-C., Varodayan, D., & Girod, B. (2007). Image authentication and tampering localization using distributed source coding. IEEE Multimedia Signal Processing Workshop.
24.
Zurück zum Zitat Varodayan, D., Chen, David, Flierl, Markus, & Girod, Bernd. (2008). Wyner-Ziv coding of video with unsupervised motion vector learning. Signal Processing: Image Communication, 23(5), 369–378.MATH Varodayan, D., Chen, David, Flierl, Markus, & Girod, Bernd. (2008). Wyner-Ziv coding of video with unsupervised motion vector learning. Signal Processing: Image Communication, 23(5), 369–378.MATH
25.
Zurück zum Zitat Lin, Y. C., Varodayan, D., & Girod, B. (2012). Image authentication using distributed source coding. IEEE Transactions on Image Processing, 21(1), 273–283.MathSciNetCrossRef Lin, Y. C., Varodayan, D., & Girod, B. (2012). Image authentication using distributed source coding. IEEE Transactions on Image Processing, 21(1), 273–283.MathSciNetCrossRef
26.
Zurück zum Zitat Slepian, D., & Wolf, J. K. (1973). Noiseless coding of correlated information sources. IEEE Transactions on Information Theory, 19(4), 471–480.MathSciNetCrossRef Slepian, D., & Wolf, J. K. (1973). Noiseless coding of correlated information sources. IEEE Transactions on Information Theory, 19(4), 471–480.MathSciNetCrossRef
27.
Zurück zum Zitat Liveris, A., Xiong, Z., & Georghiades, C. (2002). Compression of binary sources with side information at the decoder using LDPC codes. IEEE Communications Letters, 6(10), 440–442.CrossRef Liveris, A., Xiong, Z., & Georghiades, C. (2002). Compression of binary sources with side information at the decoder using LDPC codes. IEEE Communications Letters, 6(10), 440–442.CrossRef
28.
Zurück zum Zitat Chen, J., He, D., & Jagmohan, A. (2006). Slepian-Wolf code design via source-channel correspondence (pp. 2433–2437). Seattle, WA: Proceedings of IEEE International Symposium on Information Theory. Chen, J., He, D., & Jagmohan, A. (2006). Slepian-Wolf code design via source-channel correspondence (pp. 2433–2437). Seattle, WA: Proceedings of IEEE International Symposium on Information Theory.
Metadaten
Titel
Improved Tampering Detection for Image Authentication Based on Image Partitioning
verfasst von
N. M. Masoodhu Banu
S. Sujatha
Publikationsdatum
01.09.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2594-9

Weitere Artikel der Ausgabe 1/2015

Wireless Personal Communications 1/2015 Zur Ausgabe

Neuer Inhalt