Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value
- 101 Downloads
Digital images are increasingly transmitted over non-secure channels such as Internet, therefore image authentication techniques have recently gained great attention due to their importance for a large number of multimedia applications. To protect the authenticity of images, several approaches have been proposed. These approaches include conventional cryptography, semi-fragile watermarking and digital signatures. In this paper, we propose two techniques of the same type based on what we call characteristic data digest. Both techniques can blindly detect and localize malicious tampering, while maintaining reasonable tolerance to conventional content-preserving manipulations. The characteristic data is derived from the relative difference between each pair of selected DCT coefficient, AC for one technique and DC for another technique, in a central block and its counterpart estimated by the center block and its adjacent blocks. In order to maintain the relative difference relationship when the image undergoes legitimate processing, we make a pre-compensation for the coefficients. Experimental results show that our techniques are significantly superior to semi-fragile techniques under the condition of the same image fidelity, especially in tolerance range of legitimate processing, and/or the ability to detect and localize the tampered area. Due to the simplicity of the algorithms, our techniques can be used in video frame authentication, and even other digital media. In addition, this kind of proposed techniques can be extended to use other characteristic data, such as high-level moment, statistical data of images, and so on.
KeywordsImage authentication Digital image signature Semi-fragile watermark DCT transforms
This work was supported by applied basic research plan of Wuhan Science and Technology Bureau with Grant No. 2017010201010105 in China, and Shenzhen Science and Technology Innovation Committee with Grant No. JCYJ20170306170559215 in China.
- 3.Bennett W (1970) Introduction to Signal Transmission (Electrical & Electronic Engineering), 1st edn. McGraw-Hill Inc., New York, pp 100–110Google Scholar
- 5.CASIA (2017) Available: http://forensics.idealtest.org/ Accessed 28 Dec 2017
- 12.Lampson B, Rivest R (1997) Cryptography and information security group research project: a simple distributed security infrastructure. Technical report, MIT. http://www.people.csail.mit.edu/rivest/pubs.html#RL96
- 13.Lin C-Y, Chang S-F (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans Circuits Syst Video Technol 11(2):153–168Google Scholar
- 14.Lin C, Chang S (2010) Semi-fragile watermarking for authenticating JPEG visual content. Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, (9 May 2000). https://doi.org/10.1117/12.384968
- 15.Lin ET, Podilchun CI, Delp EJ (2000) Detection of image alterations using semi-fragile watermarks. Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, (9 May 2000). https://doi.org/10.1117/12.384969
- 20.Nender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 3:131–136Google Scholar
- 21.Rey C, Dugelay JL (2000) Blind detection of malicious alterations on still images using robust watermarks. Proc. IEE Secure Images and Image Authentication Colloquium, London, pp 7/1–7/6Google Scholar
- 26.Wu CW (2012) On the design of content-based multimedia authentication systems. IEEE Trans Multimed 4(3):385–393Google Scholar