A Novel Authentication Scheme for Lossy Compressed Images

被引:1
|
作者
Fouad, Mona A. M. [1 ]
Mansour, Ahmed Mokhtar A. [2 ]
机构
[1] Inst Natl Telecommun, Comp & Syst Dept, Cairo, Egypt
[2] Nile Innovat, Cairo, Egypt
关键词
Authentication; Blind; DCT; Fragile; JPEG; Robust; Security; Watermarking;
D O I
10.14257/ijsia.2015.9.6.29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel scheme is proposed for watermarking lossy compressed images just before transmission and authenticating them once they are received, away from the core of the compression and de-compression processes. The scheme is inserted into the Joint Photographic Expert Group (JPEG) structure that is encoded using the Discrete Cosine Transform (DCT) at specified locations. The watermark information is extracted from and embedded into specified DCT coefficients, following novel criteria. The scheme is robust to lossy compression; though it is fragile, exposing any slight changes of the probe images. The scheme is also blind, needs no prior information about the original image or the watermark information to authenticate the received image. Experimentally, if the received watermarked data is not manipulated, the proposed scheme verifies them as 'authenticated'. On the other side, if geometrical or image processing attacks are applied to the watermarked images, they are then verified successfully as 'not authenticated'. The proposed scheme is further evaluated and compared to similar authentication schemes. The noise added to the original image due to embedding the watermark information is 0.063 dB (decibel), overcoming all results in the reviewed literature.
引用
收藏
页码:315 / 328
页数:14
相关论文
共 50 条
  • [1] Novel Image Authentication Scheme for AMBTC-compressed Images
    Lin, Chia-Chen
    Huang, Yuehong
    Tai, Wei-Liang
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 134 - 137
  • [2] A Novel Hybrid Image Authentication Scheme for AMBTC-Compressed Images
    Lin, Chia-Chen
    Huang, Yuehong
    Tai, Wei-Liang
    DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014, 2015, 9023 : 433 - 443
  • [3] An Authentication Scheme for VQ-Compressed Images
    Wen Jiafu
    Wang Jiazhen
    Tan Yuehui
    Liu Aizhen
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 925 - 928
  • [4] Novel image authentication scheme with fine image quality for BTC-based compressed images
    Wei Li
    Chia-Chen Lin
    Jeng-Shyang Pan
    Multimedia Tools and Applications, 2016, 75 : 4771 - 4793
  • [5] Novel image authentication scheme with fine image quality for BTC-based compressed images
    Li, Wei
    Lin, Chia-Chen
    Pan, Jeng-Shyang
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) : 4771 - 4793
  • [6] Visual Quality of Lossy Compressed Images
    Ponomarenko, Nikolay
    Krivenko, Sergey
    Lukin, Vladimir
    Egiazarian, Karen
    EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS: PROCEEDINGS OF THE XTH INTERNATIONAL CONFERENCE CADSM 2009, 2009, : 137 - +
  • [7] Restoration of lossy compressed astronomical images
    Bobichon, Y
    Bijaoui, A
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL II, 1996, : 33 - 36
  • [8] Restoration of lossy compressed noisy images
    Al-Shaykh, OK
    Mersereau, RM
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (10) : 1348 - 1360
  • [9] Restoration of lossy compressed noisy images
    AiShaykh, OK
    Mersereau, RM
    ISCAS 96: 1996 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - CIRCUITS AND SYSTEMS CONNECTING THE WORLD, VOL 2, 1996, : 692 - 694
  • [10] A High-Quality Image Authentication Scheme for AMBTC-compressed Images
    Lin, Chia-Chen
    Huang, Yuehong
    Tai, Wei-Liang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4588 - 4603