Authentication with Block Level Error Localization

  • Obaid Ur-Rehman
  • Natasa Zivic
Part of the Signals and Communication Technology book series (SCT)


In this chapter, two noise tolerant data authentication algorithms are presented which are able to localize errors to the block level. As an application, image data is considered, whereby the image is divided into equal sized blocks. The proposed algorithms are able to tolerate minor modifications in the image, and at the same time, they are able to identify the major errors or forgeries. The modifications can also be localized by the proposed algorithms to the block level. It is also possible to correct the modifications to some extent. If the modifications are below a certain predefined threshold, they will be corrected. If all of the modifications are corrected, the image is declared authentic. If some modifications are not correctable, it is left for the application using the algorithms to decide if these modifications can be tolerated and the image can be partly accepted. This makes sense when retransmissions are not possible over a communication channel, e.g. in case of satellite transmission. Simulation results are presented to show the effectiveness of the scheme.


NTMAC Image blocks Error localization Error correction Weighted NTMAC Block level localization 


  1. 1.
    P.G. Freitas, R. Rigoni, M.C. Farias, Secure self-recovery watermarking scheme for error concealment and tampering detection. J. Braz. Comput. Soc. 22(5), 5 (2016)CrossRefGoogle Scholar
  2. 2.
    Y. Wu, Tamper-Localization Watermarking with Systematic Error Correcting Code. in International Conference on Image Processing, Atlanta, GA, 8–11 October 2006, pp. 1965–1968Google Scholar
  3. 3.
    M. Chen, Y. He, R.L. Lagendijk, A fragile watermark error detection scheme for wireless video communications. IEEE Trans. Multimedia 7(2), 201–211 (2005)CrossRefGoogle Scholar
  4. 4.
    S.A.H.A.E. Tabatabaei, O. Ur-Rehman, N. Zivic, AACI: The mechanism for approximate authentication and correction of images. in IEEE International Conference on Communications Workshops (ICC), Budapest, 9–13 June 2013, pp. 717–722Google Scholar
  5. 5.
    N. Zivic (ed.), Robust Image Authentication in the Presence of Noise (Springer, New York, 2015), pp. 43–74, ISBN 978-3-319-13156-6,

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Obaid Ur-Rehman
    • 1
  • Natasa Zivic
    • 1
  1. 1.Data Communications SystemsUniversity of SiegenSiegenGermany

Personalised recommendations