Image authentication and tampering localization using distributed source coding

被引:8
|
作者
Lin, Yao-Chung [1 ]
Varodayan, David [1 ]
Girod, Bernd [1 ]
机构
[1] Stanford Univ, Informat Syst Lab, Stanford, CA 94305 USA
关键词
D O I
10.1109/MMSP.2007.4412899
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) Me sharing. Many differently encoded versions of a media Me might exist. Our previous work applied distributed source coding to distinguish the legitimate diversity of encoded images from tampering. An authentication decoder was supplied with a Slepian-Wolf encoded lossy version of the image as authentication data. Distributed source coding provided the desired robustness against legitimate encoding variations, while detecting illegitimate modification. We augment the decoder to localize tampering in an image already deemed to be inauthentic. The localization decoder requires only incremental localization data beyond the authentication data since we use rate-adaptive distributed source codes. Both decoders perform joint bitplane decoding, rather than conditional bitplane decoding. Our results demonstrate that tampered image blocks can be identified with high probability using authentication plus localization data of only a few hundred bytes for a 512x512 image.
引用
收藏
页码:393 / 396
页数:4
相关论文
共 50 条
  • [21] Research progress of lossless compression for hyperspectral image using distributed source coding
    Nian, Yong-Jian
    Wan, Jian-Wei
    He, Mi
    Xin, Qin
    Nian, Y.-J. (yjnian@126.com), 2012, China Spaceflight Society (33): : 860 - 869
  • [22] Wave atom transform based image hashing using distributed source coding
    Yang, Yanchao
    Zhou, Junwei
    Duan, Feipeng
    Liu, Fang
    Cheng, Lee-Ming
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 31 : 75 - 82
  • [23] REDUCED-REFERENCE IMAGE QUALITY ASSESSMENT USING DISTRIBUTED SOURCE CODING
    Chono, Keiichi
    Lin, Yao-Chung
    Varodayan, David
    Miyamoto, Yoshihiro
    Girod, Bernd
    2008 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-4, 2008, : 609 - +
  • [24] DISTRIBUTED IMAGE TRANSMISSION USING DEEP JOINT SOURCE-CHANNEL CODING
    Wang, Sixian
    Yang, Ke
    Dai, Jincheng
    Niu, Kai
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 5208 - 5212
  • [25] GAIT AUTHENTICATION USING DISTRIBUTED SOURCE CODINGc
    Argyropoulos, S.
    Tzovaras, D.
    Ioannidis, D.
    Strintzis, M. G.
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 3108 - 3111
  • [26] Tampering with a watermarking-based image authentication scheme
    Phan, Raphael C. -W.
    PATTERN RECOGNITION, 2008, 41 (11) : 3493 - 3496
  • [27] Multi-Clue Image Tampering Localization
    Gaborini, Lorenzo
    Bestagini, Paolo
    Milani, Simone
    Tagliasacchi, Marco
    Tubaro, Stefano
    2014 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'14), 2014, : 125 - 130
  • [28] DETECTION OF IMAGE AUTHENTICATION USING PREDICTIVE LOSSLESS CODING
    Vidhya, D.
    Uma, S. S.
    2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT 2013), 2013, : 611 - 615
  • [29] Transferable adversarial attack on image tampering localization
    Cao, Gang
    Wang, Yuqi
    Zhu, Haochen
    Lou, Zijie
    Yu, Lifang
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 102
  • [30] Multiple-description image coding with distributed source coding and side information
    Wu, M
    Vetro, A
    Chen, CW
    MULTIMEDIA SYSTEMS AND APPLICATIONS VII, 2004, 5600 : 120 - 127