Abstract
Digital imagery is an important medium in information processing in the digital era. However, a major problem in information processing is that digital images can be forged easily. If this problem cannot be alleviated, the popularization of digital imagery will be decreased. Hence, in recent years, a few tamper proofing or image authentication techniques have been proposed to deal with this problem. In this paper, a new recoverable image authentication technique is proposed. Our method employs a very low bit-rated compression method called irregular sampling coding to compress the image. The compressed code is then randomly embedded into the original image using the digital watermarking technique. Since the image is highly compressed, it can be used to detect and recover the tampered-with information. Experimental results show that the proposed tamper proofing technique can effectively detect and recover the modified image. In addition, the experiments also show that the proposed technique is robust. Even though the image is 90%cropped or is highly compressed using JPEG, the quality of the recovered image is acceptable. The proposed method is therefore an effective, robust and recoverable tamper proofing technique.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Eldar, Y., Lindenbaum, M., Porat, M., Zeevi, Y.Y.: The farthest point strategy for progressive image sampling. IEEE Trans. Image Processing 6(9), 1305–1315 (1997)
Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. on Image Processing 8(1), 58–68 (1999)
Hung, K.L., Chang, C.C., Chen, T.S.: Secure discrete cosine transform based technique for recoverable tamper proofing. Optical Engineering 40(9), 1950–1958 (2001)
Kundur, D., Hatzinakos, D.: Digital watermarking for telltale tamper proofing and authentication. Proceedings of the IEEE 87(7), 1167–1180 (1999)
Ramponi, G., Carato, S.: An adaptive irregular sampling algorithm and its application to image coding. Image and Vision Computing 19, 451–460 (2001)
Lu, C.S., Liao, H.Y.M.: Multipurpose watermarking for image authentication and protection. IEEE Trans. Image Processing 10(10), 1579–1592 (2001)
Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 227–230 (1996)
Swanson, M.D., Zhu, B., Tewfik, A.H.: Transparent robust image watermarking. In: Proc. ICIP 1996, pp. 211–214 (1996)
Walton, S.: Image authentication for a slippery new age. Dr. Dobb’s J. 20, 18–26 (1995)
Wolfgan, R.B., Delp, E.J.: A watermark for digital images. In: Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 219–222 (1996)
Tsai, C.S., Chang, C.C., Chen, T.S., Chen, M.H.: Embedding robust gray-level watermarks in an image using discrete cosine transform. Distributed Multimedia Database: Techniques and Applications (to appear)
Fridrich, J., Goljan, M.: Protection of digital images using self embedding, Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology (May 14, 1999)
Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: ICIP 1999, Kobe, Japan, pp. 25–28 (1999)
Chae, J.J., Manjunath, B.S.: A technique for image data hiding and reconstruction without host image. In: Proceedings of the SPIE – The International Society for Optical Engineering, vol. 3657 (Security and Watermarking of Multimedia Contents), San Jose, CA, USA, pp. 386–396 (1999)
Mobasseri, B.G., Evans, A.T.: Content-dependent video authentication by self-watermarking in color space, Security and Watermarking of Multimedia Contents III. In: SPIE Proceedings, vol. 4314, pp. 35–44
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hung, K.L., Chang, CC. (2007). Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)