Title :
A Secure Semi-Fragile JPEG Image Authentication Scheme Based on Discrete Cosine Transform
Author :
Mursi, Mona F M ; Assassa, Ghazy M R ; Aboalsamh, Hatim A. ; Alghathbar, Khaled
Author_Institution :
Center of Excellence in Inf. Assurance (CoEIA), King Saud Univ., Riyadh, Saudi Arabia
Abstract :
The challenge in the case of image authentication is that in many cases images need to be subjected to non malicious operations like compression, so the authentication techniques need to be compression tolerant. In this paper we propose an image authentication system that remains tolerant to JPEG lossy compression operations. A scheme for JPEG grey scale images is proposed based on a data embedding method that utilizes a secret key and a secret mapping vector in the frequency domain. An encrypted feature vector extracted from the frequency domain, is embedded redundantly, and invisibly in the marked image. On the receiver side, the feature vector from the received image is derived again and compared against the extracted watermark to verify the integrity and authenticity. The proposed scheme is robust against JPEG compression up to a maximum compression of approximately 80%,, but sensitive to malicious attacks such as cutting and pasting. The experimental results demonstrate that the proposed algorithm has the advantages such as simple computation complexity, security, and good robustness to JPEG compression, and efficient detection of tampering, as well as good tolerance to noise.
Keywords :
data compression; discrete cosine transforms; feature extraction; image coding; image colour analysis; message authentication; JPEG grey scale images; JPEG lossy compression operations; compression tolerant; computation complexity; data embedding method; discrete cosine transform; malicious attacks; malicious operations; secret key; secret mapping vector; semifragile JPEG image authentication scheme; Authentication; Cryptography; Data mining; Discrete cosine transforms; Feature extraction; Frequency domain analysis; Image coding; Robustness; Transform coding; Watermarking; Authentication; DCT; Semi Fragile;
Conference_Titel :
Computing, Engineering and Information, 2009. ICC '09. International Conference on
Conference_Location :
Fullerton, CA
Print_ISBN :
978-0-7695-3538-8
DOI :
10.1109/ICC.2009.58