Image authentication and tampering localization using distributed source coding

被引:8
|
作者
Lin, Yao-Chung [1 ]
Varodayan, David [1 ]
Girod, Bernd [1 ]
机构
[1] Stanford Univ, Informat Syst Lab, Stanford, CA 94305 USA
关键词
D O I
10.1109/MMSP.2007.4412899
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) Me sharing. Many differently encoded versions of a media Me might exist. Our previous work applied distributed source coding to distinguish the legitimate diversity of encoded images from tampering. An authentication decoder was supplied with a Slepian-Wolf encoded lossy version of the image as authentication data. Distributed source coding provided the desired robustness against legitimate encoding variations, while detecting illegitimate modification. We augment the decoder to localize tampering in an image already deemed to be inauthentic. The localization decoder requires only incremental localization data beyond the authentication data since we use rate-adaptive distributed source codes. Both decoders perform joint bitplane decoding, rather than conditional bitplane decoding. Our results demonstrate that tampered image blocks can be identified with high probability using authentication plus localization data of only a few hundred bytes for a 512x512 image.
引用
收藏
页码:393 / 396
页数:4
相关论文
共 50 条
  • [31] DISTRIBUTED SOURCE CODING AUTHENTICATION OF IMAGES WITH CONTRAST AND BRIGHTNESS ADJUSTMENT AND AFFINE WARPING
    Lin, Yao-Chung
    Varodayan, David
    Girod, Bernd
    PCS: 2009 PICTURE CODING SYMPOSIUM, 2009, : 317 - 320
  • [32] Lossy Distributed Source Coding Using Graphs
    Choi, Suhan
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (04) : 262 - 264
  • [33] Distributed source coding using Raptor codes
    Fresia, M.
    Vandendorpe, L.
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1587 - 1591
  • [34] A watermarking-based image ownership and tampering authentication scheme
    Chang, CC
    Hu, YS
    Lu, TC
    PATTERN RECOGNITION LETTERS, 2006, 27 (05) : 439 - 446
  • [35] Digital Image Tampering Detection and Localization Using Singular Value Decomposition Technique
    Mall, Vinod
    Roy, Anil K.
    Mitra, Suman K.
    2013 FOURTH NATIONAL CONFERENCE ON COMPUTER VISION, PATTERN RECOGNITION, IMAGE PROCESSING AND GRAPHICS (NCVPRIPG), 2013,
  • [36] Compression of the Interferential Multispectral Image Based on Distributed Source Coding
    Song, Juan
    Li, Yunsong
    Wu, Chengke
    Feng, Ying
    SATELLITE DATA COMPRESSION, COMMUNICATION, AND PROCESSING IV, 2008, 7084
  • [37] Tampering Localization in Digital Image Using First Two Digit Probability Features
    Mire, Archana V.
    Dhok, Sanjay B.
    Mistry, Narendra J.
    Porey, Prakash D.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 3, INDIA 2016, 2016, 435 : 133 - 141
  • [38] Image Tampering Localization Based on Integrated Multiscale Attention
    Wei, Huajian
    Yan, Caiping
    Li, Hong
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2024, 36 (08): : 1237 - 1245
  • [39] Knowledge-Based Fusion for Image Tampering Localization
    Iakovidou, Chryssanthi
    Papadopoulos, Symeon
    Kompatsiaris, Yiannis
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, AIAI 2020, PT I, 2020, 583 : 177 - 188
  • [40] Hyperspectral image coding and transmission scheme based on wavelet transform and distributed source coding
    Ahmed Hagag
    Xiaopeng Fan
    Fathi E. Abd El-Samie
    Multimedia Tools and Applications, 2017, 76 : 23757 - 23776