Advertisement

A New Self-Recovery Technique for Image Authentication

  • Roberto Caldelli
  • Franco Bartolini
  • Vito Cappellini
  • Alessandro Piva
  • Mauro Barni
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2849)

Abstract

In this paper a simple and secure self recovery authentication algorithm is presented which hides an image digest into some of the DWT subbands of the to-be-authenticated image. Authentication is achieved by comparing visually the hidden digest with the image under inspection. The digest is computed through a properly modified version of JPEG coding operating at very high compression ratios. The modification is introduced to make the digest insensitive to global, innocuous manipulations. Particular care is given to ensure robustness against innocuous manipulations, and to prevent forgery attempts. Security aspects are also discussed in great detail. Experimental results are presented to demonstrate the good performance of the proposed system.

Keywords

Discrete Cosine Transform Authentication Scheme Video Surveillance Host Image JPEG Compression 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proc. ICIP 1999, IEEE Int. Conf. Image Proc., Kobe, Japan, October 1999, vol. III, pp. 792–796 (1999)Google Scholar
  2. 2.
    Chae, J.J., Manjunath, B.S.: A technique for image data hiding and reconstruction without host image. In: Security and Watarmerking of Multimedia Content, Proc. SPIE, San Jose, CA, USA, January 1999, vol. 3657, pp. 386–396 (1999)Google Scholar
  3. 3.
    Swanson, M., Zhu, B., Tewfik, A.: Data hiding for video in video. In: Proc. ICIP 1997, IEEE Int. Conf. Image Proc., S.Barbara, CA, October 1997, vol. 1, pp. 676–679 (1997)Google Scholar
  4. 4.
    Miller, M.L., Doerr, G.J., Cox, I.J.: Dirty-paper trellis codes for watermarking. In: Proc. ICIP 2002, IEEE Int. Conf. Image Processing, Rochester, NY, USA, October 2002, vol. II, pp. 129–132 (2002)Google Scholar
  5. 5.
    Campisi, P., Kundur, D., Hatzinakos, D., Neri, A.: Compressive data hiding: An unconventional approach for improved color image coding. EURASIP Journal on Applied Signal Processing 2002(2), 152–163 (2002)zbMATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Roberto Caldelli
    • 1
  • Franco Bartolini
    • 1
  • Vito Cappellini
    • 1
  • Alessandro Piva
    • 2
  • Mauro Barni
    • 3
  1. 1.Department of Electronics and TelecommunicationsUniversity of Florence, ItalyFlorenceItaly
  2. 2.National Inter-university Consortium for Telecommunications (CNIT)University of Florence, ItalyFlorenceItaly
  3. 3.Department of Information EngineeringUniversity of Siena, ItalySienaItaly

Personalised recommendations