Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1101149.1101267acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
Article

SSF fingerprint for image authentication: an incidental distortion resistant scheme

Published: 06 November 2005 Publication History

Abstract

We propose a novel method for image authentication which can distinguish incidental manipulations from malicious ones. The authentication fingerprint is based on the Hotelling's T-square statistic (HTS) via Principal Component Analysis (PCA) of block DCT coefficients. HTS values of all blocks construct an unique and stable "block-edge image", i.e., Structural and Statistical Fingerprint (SSF). The characteristic of the SSF is that it is short, and can tolerate content-preserving modifications while keeping sensitive to content-changing modifications, and can locate tampered blocks easily. Furthermore, we use Fisher criterion to obtain optimal threshold for distinguishing manipulations. The security of the SSF is also achieved by encryption of the DCT coefficients with chaotic sequences. Experiments show that the proposed method is effective for authentication.

References

[1]
C.-Y. Lin and S.-F. Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol., 11(2):153--168, Feb. 2001.
[2]
C.-S. Lu and H.-Y.M. Liao. Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimedia, 5(2):161--173, June 2003.
[3]
J. Dittman, A. Steinmetz, and R. Steinmetz. Content based digital signature for motion picture authentication and content-fragile watermarking. In Proc. IEEE Int. Conf. Multimedia Comp. and Sys., pages 209--213, 1999.
[4]
Lou DC and Liu JL. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans. Consumer Electronics, 46(1):31--39, Feb. 2000.
[5]
S.Bhattacharjee and M.Kutter. Compression tolerant image authentication. In Proc. IEEE ICIP 98, pages 435--439, Oct. 1998
[6]
K.Mihcak and R.Venkatesan. New iterative geometric techniques for robust image hashing. In Proc. ACM Work. Security and Privacy in Dig. Rights Man., Nov. 2001.
[7]
V.Monga and B.L.Evans. Robust perceptual image hashing using feature points. In Proc. IEEE ICIP 2004, volume 3, pages 677--680, Oct. 2004
[8]
B.B.Zhu, M.D.Swanson, A.H.Tewfik. When seeing isn't believing - multimedia authentication technologies. IEEE Signal Processing Magazine, 21(2):40--49, March 2004.
[9]
J.S.Seoa, J.Haitsmab, T.Kalkerb, C.D.Yoo. A robust image fingerprinting system using the radon transform. Signal Processing: Image Communication, 19(4):325--339, April 2004.
[10]
I. J. Cox, M. L. Miller and J. A. Bloom. Digital Watermarking. Morgan Kaufmann, NewYork, 2001.
[11]
J. Edward Jackson. A User's Guide to Principal Components. John Wiley and Sons, New York, 1991.

Cited By

View all
  • (2013)Compact and Robust Image Fingerprints Based on CCA of Local FeaturesAdvances in Multimedia Information Processing – PCM 201310.1007/978-3-319-03731-8_80(856-865)Online publication date: 13-Dec-2013
  • (2010)Image hashing framework for tampering localization in distorted imagesIEICE Electronics Express10.1587/elex.7.16797:22(1679-1685)Online publication date: 2010
  • (2008)Methods for image authenticationMultimedia Tools and Applications10.1007/s11042-007-0154-339:1(1-46)Online publication date: 1-Aug-2008

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia
November 2005
1110 pages
ISBN:1595930442
DOI:10.1145/1101149
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 November 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. PCA
  2. digital signature
  3. image authentication

Qualifiers

  • Article

Conference

MM05

Acceptance Rates

MULTIMEDIA '05 Paper Acceptance Rate 49 of 312 submissions, 16%;
Overall Acceptance Rate 2,145 of 8,556 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Compact and Robust Image Fingerprints Based on CCA of Local FeaturesAdvances in Multimedia Information Processing – PCM 201310.1007/978-3-319-03731-8_80(856-865)Online publication date: 13-Dec-2013
  • (2010)Image hashing framework for tampering localization in distorted imagesIEICE Electronics Express10.1587/elex.7.16797:22(1679-1685)Online publication date: 2010
  • (2008)Methods for image authenticationMultimedia Tools and Applications10.1007/s11042-007-0154-339:1(1-46)Online publication date: 1-Aug-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media