Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding
Digital imagery is an important medium in information processing in the digital era. However, a major problem in information processing is that digital images can be forged easily. If this problem cannot be alleviated, the popularization of digital imagery will be decreased. Hence, in recent years, a few tamper proofing or image authentication techniques have been proposed to deal with this problem. In this paper, a new recoverable image authentication technique is proposed. Our method employs a very low bit-rated compression method called irregular sampling coding to compress the image. The compressed code is then randomly embedded into the original image using the digital watermarking technique. Since the image is highly compressed, it can be used to detect and recover the tampered-with information. Experimental results show that the proposed tamper proofing technique can effectively detect and recover the modified image. In addition, the experiments also show that the proposed technique is robust. Even though the image is 90%cropped or is highly compressed using JPEG, the quality of the recovered image is acceptable. The proposed method is therefore an effective, robust and recoverable tamper proofing technique.
KeywordsOriginal Image Discrete Cosine Transform JPEG Compression Digital Watermark Inverse Discrete Cosine Transform
Unable to display preview. Download preview PDF.
- 7.Schneider, M., Chang, S.-F.: A robust content based digital signature for image authentication. In: Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 227–230 (1996)Google Scholar
- 8.Swanson, M.D., Zhu, B., Tewfik, A.H.: Transparent robust image watermarking. In: Proc. ICIP 1996, pp. 211–214 (1996)Google Scholar
- 9.Walton, S.: Image authentication for a slippery new age. Dr. Dobb’s J. 20, 18–26 (1995)Google Scholar
- 10.Wolfgan, R.B., Delp, E.J.: A watermark for digital images. In: Proc. IEEE Int. Conf. Image Processing, vol. 3, pp. 219–222 (1996)Google Scholar
- 11.Tsai, C.S., Chang, C.C., Chen, T.S., Chen, M.H.: Embedding robust gray-level watermarks in an image using discrete cosine transform. Distributed Multimedia Database: Techniques and Applications (to appear)Google Scholar
- 12.Fridrich, J., Goljan, M.: Protection of digital images using self embedding, Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology (May 14, 1999)Google Scholar
- 13.Fridrich, J., Goljan, M.: Images with self-correcting capabilities. In: ICIP 1999, Kobe, Japan, pp. 25–28 (1999)Google Scholar
- 14.Chae, J.J., Manjunath, B.S.: A technique for image data hiding and reconstruction without host image. In: Proceedings of the SPIE – The International Society for Optical Engineering, vol. 3657 (Security and Watermarking of Multimedia Contents), San Jose, CA, USA, pp. 386–396 (1999)Google Scholar
- 15.Mobasseri, B.G., Evans, A.T.: Content-dependent video authentication by self-watermarking in color space, Security and Watermarking of Multimedia Contents III. In: SPIE Proceedings, vol. 4314, pp. 35–44Google Scholar