A New Self-Recovery Technique for Image Authentication
In this paper a simple and secure self recovery authentication algorithm is presented which hides an image digest into some of the DWT subbands of the to-be-authenticated image. Authentication is achieved by comparing visually the hidden digest with the image under inspection. The digest is computed through a properly modified version of JPEG coding operating at very high compression ratios. The modification is introduced to make the digest insensitive to global, innocuous manipulations. Particular care is given to ensure robustness against innocuous manipulations, and to prevent forgery attempts. Security aspects are also discussed in great detail. Experimental results are presented to demonstrate the good performance of the proposed system.
KeywordsDiscrete Cosine Transform Authentication Scheme Video Surveillance Host Image JPEG Compression
Unable to display preview. Download preview PDF.
- 1.Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proc. ICIP 1999, IEEE Int. Conf. Image Proc., Kobe, Japan, October 1999, vol. III, pp. 792–796 (1999)Google Scholar
- 2.Chae, J.J., Manjunath, B.S.: A technique for image data hiding and reconstruction without host image. In: Security and Watarmerking of Multimedia Content, Proc. SPIE, San Jose, CA, USA, January 1999, vol. 3657, pp. 386–396 (1999)Google Scholar
- 3.Swanson, M., Zhu, B., Tewfik, A.: Data hiding for video in video. In: Proc. ICIP 1997, IEEE Int. Conf. Image Proc., S.Barbara, CA, October 1997, vol. 1, pp. 676–679 (1997)Google Scholar
- 4.Miller, M.L., Doerr, G.J., Cox, I.J.: Dirty-paper trellis codes for watermarking. In: Proc. ICIP 2002, IEEE Int. Conf. Image Processing, Rochester, NY, USA, October 2002, vol. II, pp. 129–132 (2002)Google Scholar