a jpeg tolerant image authentication scheme
play

A JPEG-tolerant Image Authentication Scheme Takeyuki Uehara, Rei - PowerPoint PPT Presentation

A JPEG-tolerant Image Authentication Scheme Takeyuki Uehara, Rei Safavi-Naini, Philip Ogunbona Centre for Information Security, University of Wollongong Motorola Australian Research Centre AUSTRALIA To be published


  1. � ✁ � ✁ � A JPEG-tolerant Image Authentication Scheme Takeyuki Uehara, Rei Safavi-Naini, Philip Ogunbona Centre for Information Security, University of Wollongong Motorola Australian Research Centre AUSTRALIA To be published ACM Journal of Multimedia Communication UW NIVERSITY OF JPEG-tolerant Image Authentication – p.1/10 OLLONGONG

  2. � � Image authentication Cryptographic authentication detects single bit change. Image authentication need not provide bit accuracy: redundancy and irrelevancy Image files are mainly in compressed form. Lossy compression systems : JPEG, JPEG2000, MPEG Changes that are caused by compression are acceptable: within a predefined compression rate High compression rate large changes (data loss) Low compression rate small changes (small loss) UW NIVERSITY OF JPEG-tolerant Image Authentication – p.2/10 OLLONGONG

  3. � ✁ � A JPEG tolerant authentication system JPEG compression : 1 Transform : divide the image into pixel blocks use two dimensional DCT transform to generate 64 coefficients ( 64 frequencies) 2 Quantization : Remove irrelevant information. 3 Entropy coding : Remove redundancy : run-length coding and Huffman/arithmetic coding. UW NIVERSITY OF JPEG-tolerant Image Authentication – p.3/10 OLLONGONG

  4. ✎ ✡ ✑ ✡ ☛ ✏ ✍ ✏ ✡ ☛ ✑ ✍ ✏ ☛ ✍ ✒ ✍ ✏ ✞ ✞ ✡ ☛ ✏ ✍ ✑ ✡ ☛ ✍ ✡ ✠ ✞ ✞ ✞ � ✁ � � ☎✆ ✂ ✝ ✆ ✁ ✞ ✞ ✟ ✑ Calculating the authenticator Authentication : Divide the image into pixel blocks. Transform each block using the DCT. Partition the blocks into group, . ✁✄✂ Select a subset of frequencies. For each selected frequency , and for each group form a feature code ☛✌☞ . The authenticator is the sequence of feature codes, encoded in binary, UW NIVERSITY OF JPEG-tolerant Image Authentication – p.4/10 OLLONGONG

  5. Calculating a feature code A feature code is a linear sum of the coeffcients. Key Grouping Linear sums Transformed coefficients Y 1 One−to−one mapping Y 2 Y 3 UW NIVERSITY OF JPEG-tolerant Image Authentication – p.5/10 OLLONGONG

  6. Encoding a feature code Use successive halving of the interval. The length depends on the required compression tolerance. Y MAX 1 1 1 (u) Y j 1 0 0 0 0 Y MIN 1 0 1 0 UW NIVERSITY OF JPEG-tolerant Image Authentication – p.6/10 OLLONGONG

  7. � ✎ ✡ ☛ ☞ ✍ Verification Compute from the reconstructed coefficients. Decode the feature codes. The two part must be almost equal. YMAX Rejected 1 1 1 1 Accepted 0 0 Error 0 Tolerance Rejected 0 YMIN 1 0 1 0 UW NIVERSITY OF JPEG-tolerant Image Authentication – p.7/10 OLLONGONG

  8. Performance UW NIVERSITY OF JPEG-tolerant Image Authentication – p.8/10 OLLONGONG

  9. UW NIVERSITY OF JPEG-tolerant Image Authentication – p.9/10 OLLONGONG

  10. UW NIVERSITY OF JPEG-tolerant Image Authentication – p.10/10 OLLONGONG

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend