DocumentCode :
2008158
Title :
Compression tolerant image authentication
Author :
Bhattacharjee, Sushil ; Kutter, Martin
Author_Institution :
Signal Process. Lab., Fed. Inst. of Technol., Lausanne, Switzerland
Volume :
1
fYear :
1998
fDate :
4-7 Oct 1998
Firstpage :
435
Abstract :
It is straightforward to apply general schemes for authenticating digital data to the problem of authenticating digital images. However, such a scheme would not authenticate images that have undergone lossy compression, even though they may not have been manipulated otherwise. We propose a scheme for authenticating the visual content of digital images. This scheme is robust to compression noise, but will detect deliberate manipulation of the image-data. The proposed scheme is based on the extraction of feature-points from the image. These feature-points are defined so as to be relatively unaffected by lossy compression. The set of feature-points from a given image is encrypted using public key encryption, to generate the digital signature of the image. Authenticity is verified by comparing the feature-points of the image in question, with those recovered from the previously computed digital signature
Keywords :
data compression; feature extraction; image coding; message authentication; noise; public key cryptography; compression noise; compression tolerant image authentication; digital data; digital images; digital signature; feature-points extraction; image data manipulation detection; lossy compression; public key encryption; visual content; Authentication; Digital images; Digital signal processing; Digital signatures; Feature extraction; Histograms; Image coding; Noise robustness; Public key; Public key cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on
Conference_Location :
Chicago, IL
Print_ISBN :
0-8186-8821-1
Type :
conf
DOI :
10.1109/ICIP.1998.723518
Filename :
723518
Link To Document :
بازگشت