A robust image authentication method distinguishing JPEG compression from malicious manipulation
Top Cited Papers
- 1 February 2001
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Circuits and Systems for Video Technology
- Vol. 11 (2) , 153-168
- https://doi.org/10.1109/76.905982
Abstract
Image authentication verifies the originality of an image by detecting malicious manipulations. Its goal is different from that of image watermarking, which embeds into the image a signature surviving most manipulations. Most existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some practical applications demand techniques that can distinguish acceptable manipulations (e.g., compression) from malicious ones. In this paper, we present an effective technique for image authentication which can prevent malicious manipulations but allow JPEG lossy compression. The authentication signature is based on the invariance of the relationships between discrete cosine transform (DCT) coefficients at the same position in separate blocks of an image. These relationships are preserved when DCT coefficients are quantized in JPEG compression. Our proposed method can distinguish malicious manipulations from JPEG lossy compression regardless of the compression ratio or the number of compression iterations. We describe adaptive methods with probabilistic guarantee to handle distortions introduced by various acceptable manipulations such as integer rounding, image filtering, image enhancement, or scaling-recaling. We also present theoretical and experimental results to demonstrate the effectiveness of the technique.Keywords
This publication has 11 references indexed in Scilit:
- A robust content based digital signature for image authenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Image watermarking for tamper detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Compression tolerant image authenticationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An invisible watermarking technique for image verificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Content-based integrity protection of digital imagesPublished by SPIE-Intl Soc Optical Eng ,1999
- Issues and solutions for authenticating MPEG videoPublished by SPIE-Intl Soc Optical Eng ,1999
- Secure spread spectrum watermarking for multimediaIEEE Transactions on Image Processing, 1997
- Cryptology for digital TV broadcastingProceedings of the IEEE, 1995
- The trustworthy digital camera: restoring credibility to the photographic imageIEEE Transactions on Consumer Electronics, 1993
- New directions in cryptographyIEEE Transactions on Information Theory, 1976