Skip to main content

A New Self-Recovery Technique for Image Authentication

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2849))

Abstract

In this paper a simple and secure self recovery authentication algorithm is presented which hides an image digest into some of the DWT subbands of the to-be-authenticated image. Authentication is achieved by comparing visually the hidden digest with the image under inspection. The digest is computed through a properly modified version of JPEG coding operating at very high compression ratios. The modification is introduced to make the digest insensitive to global, innocuous manipulations. Particular care is given to ensure robustness against innocuous manipulations, and to prevent forgery attempts. Security aspects are also discussed in great detail. Experimental results are presented to demonstrate the good performance of the proposed system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: Proc. ICIP 1999, IEEE Int. Conf. Image Proc., Kobe, Japan, October 1999, vol. III, pp. 792–796 (1999)

    Google Scholar 

  2. Chae, J.J., Manjunath, B.S.: A technique for image data hiding and reconstruction without host image. In: Security and Watarmerking of Multimedia Content, Proc. SPIE, San Jose, CA, USA, January 1999, vol. 3657, pp. 386–396 (1999)

    Google Scholar 

  3. Swanson, M., Zhu, B., Tewfik, A.: Data hiding for video in video. In: Proc. ICIP 1997, IEEE Int. Conf. Image Proc., S.Barbara, CA, October 1997, vol. 1, pp. 676–679 (1997)

    Google Scholar 

  4. Miller, M.L., Doerr, G.J., Cox, I.J.: Dirty-paper trellis codes for watermarking. In: Proc. ICIP 2002, IEEE Int. Conf. Image Processing, Rochester, NY, USA, October 2002, vol. II, pp. 129–132 (2002)

    Google Scholar 

  5. Campisi, P., Kundur, D., Hatzinakos, D., Neri, A.: Compressive data hiding: An unconventional approach for improved color image coding. EURASIP Journal on Applied Signal Processing 2002(2), 152–163 (2002)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Caldelli, R., Bartolini, F., Cappellini, V., Piva, A., Barni, M. (2003). A New Self-Recovery Technique for Image Authentication. In: García, N., Salgado, L., Martínez, J.M. (eds) Visual Content Processing and Representation. VLBV 2003. Lecture Notes in Computer Science, vol 2849. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39798-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39798-4_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20081-9

  • Online ISBN: 978-3-540-39798-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics