A JPEG-tolerant Image Authentication Scheme Takeyuki Uehara, Rei - - PowerPoint PPT Presentation

a jpeg tolerant image authentication scheme
SMART_READER_LITE
LIVE PREVIEW

A JPEG-tolerant Image Authentication Scheme Takeyuki Uehara, Rei - - PowerPoint PPT Presentation

A JPEG-tolerant Image Authentication Scheme Takeyuki Uehara, Rei Safavi-Naini, Philip Ogunbona Centre for Information Security, University of Wollongong Motorola Australian Research Centre AUSTRALIA To be published


slide-1
SLIDE 1

UW

NIVERSITY OLLONGONG

OF

A JPEG-tolerant Image Authentication Scheme

  • Takeyuki Uehara,
  • Rei Safavi-Naini,

Philip Ogunbona

  • Centre for Information Security, University of Wollongong

Motorola Australian Research Centre AUSTRALIA To be published ACM Journal of Multimedia Communication

JPEG-tolerant Image Authentication – p.1/10

slide-2
SLIDE 2

UW

NIVERSITY OLLONGONG

OF

Image authentication

Cryptographic authentication detects single bit change. Image authentication need not provide bit accuracy: redundancy and irrelevancy Image files are mainly in compressed form. Lossy compression systems : JPEG, JPEG2000, MPEG Changes that are caused by compression are acceptable: within a predefined compression rate High compression rate

  • large changes (data loss)

Low compression rate

  • small changes (small loss)

JPEG-tolerant Image Authentication – p.2/10

slide-3
SLIDE 3

UW

NIVERSITY OLLONGONG

OF

A JPEG tolerant authentication system

JPEG compression : 1 Transform : divide the image into

  • pixel blocks

use two dimensional DCT transform to generate 64 coefficients ( 64 frequencies) 2 Quantization : Remove irrelevant information. 3 Entropy coding : Remove redundancy: run-length coding and Huffman/arithmetic coding.

JPEG-tolerant Image Authentication – p.3/10

slide-4
SLIDE 4

UW

NIVERSITY OLLONGONG

OF

Calculating the authenticator

Authentication : Divide the image into

  • pixel blocks.

Transform each block using the DCT. Partition the blocks into

  • group,
✁✄✂ ☎✆ ✁ ✂ ✝ ✆ ✞ ✞ ✞

. Select a subset of frequencies. For each selected frequency

, and for each group

form a feature code

✡ ☛✌☞ ✍ ✎

. The authenticator is the sequence of feature codes, encoded in binary,

✡ ☛ ✏ ✍ ✏ ✡ ☛ ✑ ✍ ✏ ✡ ☛ ✒ ✍ ✏ ✞ ✞ ✡ ☛ ✏ ✍ ✑ ✡ ☛ ✑ ✍ ✑ ✞ ✞

JPEG-tolerant Image Authentication – p.4/10

slide-5
SLIDE 5

UW

NIVERSITY OLLONGONG

OF

Calculating a feature code

A feature code is a linear sum of the coeffcients.

One−to−one mapping Transformed coefficients Linear sums Grouping

2

Y

1

Y Key Y 3

JPEG-tolerant Image Authentication – p.5/10

slide-6
SLIDE 6

UW

NIVERSITY OLLONGONG

OF

Encoding a feature code

Use successive halving of the interval. The length depends on the required compression tolerance.

1

Y MAX Y MIN

1

Y

1 1 1 1

(u) j

JPEG-tolerant Image Authentication – p.6/10

slide-7
SLIDE 7

UW

NIVERSITY OLLONGONG

OF

Verification

Compute

☛ ☞ ✍ ✎

from the reconstructed coefficients. Decode the feature codes. The two part must be almost equal.

1 1

YMIN YMAX

1 1 Accepted Rejected Rejected

Error Tolerance

1 1

JPEG-tolerant Image Authentication – p.7/10

slide-8
SLIDE 8

UW

NIVERSITY OLLONGONG

OF

Performance

JPEG-tolerant Image Authentication – p.8/10

slide-9
SLIDE 9

UW

NIVERSITY OLLONGONG

OF

JPEG-tolerant Image Authentication – p.9/10

slide-10
SLIDE 10

UW

NIVERSITY OLLONGONG

OF

JPEG-tolerant Image Authentication – p.10/10