a jpeg tolerant image authentication scheme
play

A JPEG-tolerant Image Authentication Scheme Takeyuki Uehara, Rei - PowerPoint PPT Presentation

A JPEG-tolerant Image Authentication Scheme Takeyuki Uehara, Rei Safavi-Naini, Philip Ogunbona Centre for Information Security, University of Wollongong Motorola Australian Research Centre AUSTRALIA To be published


  1. � ✁ � ✁ � A JPEG-tolerant Image Authentication Scheme Takeyuki Uehara, Rei Safavi-Naini, Philip Ogunbona Centre for Information Security, University of Wollongong Motorola Australian Research Centre AUSTRALIA To be published ACM Journal of Multimedia Communication UW NIVERSITY OF JPEG-tolerant Image Authentication – p.1/10 OLLONGONG

  2. � � Image authentication Cryptographic authentication detects single bit change. Image authentication need not provide bit accuracy: redundancy and irrelevancy Image files are mainly in compressed form. Lossy compression systems : JPEG, JPEG2000, MPEG Changes that are caused by compression are acceptable: within a predefined compression rate High compression rate large changes (data loss) Low compression rate small changes (small loss) UW NIVERSITY OF JPEG-tolerant Image Authentication – p.2/10 OLLONGONG

  3. � ✁ � A JPEG tolerant authentication system JPEG compression : 1 Transform : divide the image into pixel blocks use two dimensional DCT transform to generate 64 coefficients ( 64 frequencies) 2 Quantization : Remove irrelevant information. 3 Entropy coding : Remove redundancy : run-length coding and Huffman/arithmetic coding. UW NIVERSITY OF JPEG-tolerant Image Authentication – p.3/10 OLLONGONG

  4. ✎ ✡ ✑ ✡ ☛ ✏ ✍ ✏ ✡ ☛ ✑ ✍ ✏ ☛ ✍ ✒ ✍ ✏ ✞ ✞ ✡ ☛ ✏ ✍ ✑ ✡ ☛ ✍ ✡ ✠ ✞ ✞ ✞ � ✁ � � ☎✆ ✂ ✝ ✆ ✁ ✞ ✞ ✟ ✑ Calculating the authenticator Authentication : Divide the image into pixel blocks. Transform each block using the DCT. Partition the blocks into group, . ✁✄✂ Select a subset of frequencies. For each selected frequency , and for each group form a feature code ☛✌☞ . The authenticator is the sequence of feature codes, encoded in binary, UW NIVERSITY OF JPEG-tolerant Image Authentication – p.4/10 OLLONGONG

  5. Calculating a feature code A feature code is a linear sum of the coeffcients. Key Grouping Linear sums Transformed coefficients Y 1 One−to−one mapping Y 2 Y 3 UW NIVERSITY OF JPEG-tolerant Image Authentication – p.5/10 OLLONGONG

  6. Encoding a feature code Use successive halving of the interval. The length depends on the required compression tolerance. Y MAX 1 1 1 (u) Y j 1 0 0 0 0 Y MIN 1 0 1 0 UW NIVERSITY OF JPEG-tolerant Image Authentication – p.6/10 OLLONGONG

  7. � ✎ ✡ ☛ ☞ ✍ Verification Compute from the reconstructed coefficients. Decode the feature codes. The two part must be almost equal. YMAX Rejected 1 1 1 1 Accepted 0 0 Error 0 Tolerance Rejected 0 YMIN 1 0 1 0 UW NIVERSITY OF JPEG-tolerant Image Authentication – p.7/10 OLLONGONG

  8. Performance UW NIVERSITY OF JPEG-tolerant Image Authentication – p.8/10 OLLONGONG

  9. UW NIVERSITY OF JPEG-tolerant Image Authentication – p.9/10 OLLONGONG

  10. UW NIVERSITY OF JPEG-tolerant Image Authentication – p.10/10 OLLONGONG

Recommend


More recommend