Toward a robust image authentication method surviving JPEG lossy compression

被引:0
|
作者
Chen, Chien-Chang [1 ]
Lin, Cheng-Shian [1 ]
机构
[1] Hsuan Chuang Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
image authentication; discrete cosine transform (DCT); JPEG quantization; quantization sum invariant property; further quantization property;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a robust image authentication approach that distinguishes malicious attacks from JPEG lossy compression. The authentication procedure calculates the relationships between important DCT coefficients in each pair of DCT blocks and pre-defined thresholds to form the authentication message, and then embeds the encryption of the authenticated message into other DCT coefficients. The message calculation and embedding procedure are based on two proposed quantization properties that always exist under different JPEG quantization tables. Therefore, the proposed image authentication approach can tolerate JPEG compression efficiently. Experimental results demonstrate the effectiveness of the proposed image authentication approach.
引用
收藏
页码:511 / 524
页数:14
相关论文
共 50 条
  • [1] Toward a robust image authentication method surviving JPEG lossy compression
    Department of Computer Science, Hsuan Chuang University, Hsinchu, 300, Taiwan
    J. Inf. Sci. Eng., 2007, 2 (511-524):
  • [2] A robust image authentication method surviving JPEG lossy compression
    Lin, CY
    Chang, SF
    STORAGE AND RETRIEVAL FOR IMAGE AND VIDEO DATABASES VI, 1997, 3312 : 296 - 307
  • [3] Bi-level image watermiarking for image authentication surviving JPEG lossy compression
    Patra, JC
    Tan, CH
    Ang, EL
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 713 - 716
  • [4] Adversarial robust image steganography against lossy JPEG compression
    Liu, Minglin
    Fan, Hangyu
    Wei, Kangkang
    Luo, Weiqi
    Lu, Wei
    SIGNAL PROCESSING, 2022, 200
  • [5] A robust image authentication method distinguishing JPEG compression from malicious manipulation
    Lin, CY
    Chang, SF
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2001, 11 (02) : 153 - 168
  • [6] Watermarking-based image authentication robust to JPEG compression
    Preda, R. O.
    Vizireanu, D. N.
    ELECTRONICS LETTERS, 2015, 51 (23) : 1873 - 1874
  • [7] Comparison on accuracy of image matching between lossy JPEG compression and lossy JPEG 2000 compression
    Matsuoka, Ryuji
    Sone, Mitsuo
    Sudo, Noboru
    Yokotsuka, Hideyo
    Shirai, Naoki
    IMAGE AND SIGNAL PROCESSING FOR REMOTE SENSING XIX, 2013, 8892
  • [8] A Hybrid Image Authentication Method Robust To Jpeg Attacks
    Gencturk, Beste
    Nabiyev, Vasif
    Ulutas, Guzin
    Ulutas, Mustafa
    2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 1596 - 1599
  • [9] A robust image authentication method surviving acceptable modifications
    Kim, MA
    Song, GS
    Lee, WH
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 722 - 727
  • [10] RIHNet: A Robust Image Hiding Method for JPEG Compression
    Jin, Xin
    Cheng, Zien
    Jiang, Qian
    Wei, Ping
    Dong, Yunyun
    Wu, Liwen
    Miao, Shengfa
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT X, ICIC 2024, 2024, 14871 : 29 - 42