Skip to main content

Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication

  • Chapter
Transactions on Data Hiding and Multimedia Security II

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 4499))

Abstract

Content-based image authentication typically assesses authenticity based on a distance measure between the image to be tested and its original. Commonly employed distance measures such as the Minkowski measures (including Hamming and Euclidean distances) may not be adequate for content-based image authentication since they do not exploit statistical and spatial properties in features. This paper proposes a feature distance measure for content-based image authentication based on statistical and spatial properties of the feature differences. The proposed statistics- and spatiality-based measure (SSM) is motivated by an observation that most malicious manipulations are localized whereas acceptable manipulations result in global distortions. A statistical measure, kurtosis, is used to assess the shape of the feature difference distribution; a spatial measure, the maximum connected component size, is used to assess the degree of object concentration of the feature differences. The experimental results have confirmed that our proposed measure is better than previous measures in distinguishing malicious manipulations from acceptable ones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lin, C.Y., Chang, S.F.: A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation. IEEE Transaction on Circuits and Systems of Video Technology 11, 153–168 (2001)

    Article  Google Scholar 

  2. Martinian, E., Wornell, G.W., Chen, B.: Authentication With Distortion Criteria. IEEE Transaction on Information Theory 51(7), 2523–2542 (2005)

    Article  MathSciNet  Google Scholar 

  3. Dittmann, J., Steinmetz, A., Steinmetz, R.: Content-based Digital Signature for Motion Pictures Authentication and Content-fragile Watermarking. In: IEEE International Conference on Multimedia Computing and Systems, vol. 2, pp. 209–213 (1999)

    Google Scholar 

  4. Zhu, B.B., Swanson, M.D., Tewfik, A.H.: When Seeing Isn’t Believing: Multimedia Authentication Technologies. IEEE Signal Processing Magazine 21(2), 40–49 (2004)

    Article  Google Scholar 

  5. Wang, Y., Ostermann, J., Zhang, Y.Q.: Video Processing and Communications. Prentice-Hall, Englewood Cliffs (2002)

    Google Scholar 

  6. Queluz, M.P.: Authentication of Digital Images and Video: Generic Models and a New Contribution. Signal Processing: Image Communication 16, 461–475 (2001)

    Article  Google Scholar 

  7. Chang, E.C., et al.: Robust Image Authentication Using Content-based Compression. ACM Multimedia Systems Journal 9(2), 121–130 (2003)

    Article  Google Scholar 

  8. Sun, Q., Chang, S.F.: Semi-fragile Image Authentication using Generic Wavelet Domain Features and ECC. In: IEEE International Conference on Image Processing (ICIP), Rochester, USA (Sep. 2002)

    Google Scholar 

  9. Ye, S., Sun, Q., Chang, E.C.: Error Resilient Content-based Image Authentication Over Wireless Channel. In: IEEE International Symposium on Circuits and Systems, Japan (2005)

    Google Scholar 

  10. Wu, C.W.: On the Design of Content-Based Multimedia Authentication Systems. IEEE Transactions on Multimedia 4(3), 385–393 (2002)

    Article  Google Scholar 

  11. Schneider, M., Chang, S.F.: A Robust Content-based Digital Signature for Image Authentication. In: Proceedings of International Conference on Image Processing (ICIP), vol. 3, pp. 227–230 (1996)

    Google Scholar 

  12. Li, B., Chang, E., Wu, Y.: Discovery of a Perceptual Distance Function for Measuring Image Similarity. ACM Multimedia Journal (Special Issue on Content-based Image Retrieval) 8(6), 512–522 (2003)

    Article  Google Scholar 

  13. Sun, Q., et al.: A Crypto Signature Scheme for Image Authentication over Wireless Channel. International Journal of Image and Graphics 5(1), 1–14 (2005)

    Article  Google Scholar 

  14. Cannons, J.L., Moulin, P.: Design and Statistical Analysis of a Hash-Aided Image Watermarking System. IEEE Transaction on Image Processing 13(10), 1393–1408 (2004)

    Article  Google Scholar 

  15. Jain, R., Kasturi, R., Schunck, B.G.: Machine Vision. McGraw Hill, New York (1995)

    Google Scholar 

  16. Erceg, V., Hari, K.: Channel Models for Fixed Wireless Applications. IEEE 802.16 Broadband Wireless Access Working Group (2001)

    Google Scholar 

  17. Golle, P., Modadugu, N.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: Proceedings of the Symposium on Network and Distributed Systems Security, pp. 13–22 (2001)

    Google Scholar 

  18. Ye, S., Sun, Q., Chang, E.C.: Edge Directed Filter based Error Concealment for Wavelet-based Images. In: IEEE International Conference on Image Processing, Singapore (2004)

    Google Scholar 

  19. Chou, W.: Classifying Image Pixels into Shaped, Smooth and Textured Points. Pattern Recognition 32(10), 1697–1706 (1999)

    Article  Google Scholar 

  20. Ye, S., Lin, X., Sun, Q.: Content Based Error Detection and Concealment for Image Transmission over Wireless Channel. In: IEEE International Symposium on Circuits and Systems (ISCAS), Thailand (May 2003)

    Google Scholar 

  21. Boliek, M. (ed.): JPEG 2000 Final Committee Draft. ISO/IEC FCD1.5444-1 (Mar. 2000)

    Google Scholar 

  22. Yu, Y., Acton, S.T.: Speckle Reducing Anisotropic Diffusion. IEEE Transaction on Image Processing 11(11), 1260–1270 (2002)

    Article  MathSciNet  Google Scholar 

  23. Paquet, A.H., Ward, R.K., Pitas, I.: Wavelet Packets-based Digital Watermarking for Image Verification and Authentication. Signal Processing (Special Issue on Security of Data Hiding Technologies) 83(10), 2117–2132 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yun Q. Shi

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this chapter

Cite this chapter

Ye, S., Sun, Q., Chang, EC. (2007). Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security II. Lecture Notes in Computer Science, vol 4499. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73092-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73092-7_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73091-0

  • Online ISBN: 978-3-540-73092-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics