Název: Image Authentication Using Robust Image Hashing with Localization and Self-Recovery
Autoři: Hassan, Ammar M.
Hasan, Yassin M. Y.
Wahab, Mohamed A. A.
Citace zdrojového dokumentu: WSCG 2010: Communication Papers Proceedings: 18th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision in co-operation with EUROGRAPHICS, p. 251-258.
Datum vydání: 2010
Nakladatel: Václav Skala - UNION Agency
Typ dokumentu: konferenční příspěvek
conferenceObject
URI: http://wscg.zcu.cz/WSCG2010/Papers_2010/!_2010_Short-proceedings.pdf
http://hdl.handle.net/11025/11067
ISBN: 978-80-86943-87-9
Klíčová slova: kryptografické hešování;obrázková autentizace;vodoznaky
Klíčová slova v dalším jazyce: cryptographic hashing;image authentication;watermarks
Abstrakt: The rapid growth of efficient tools, which generate and edit digital images demands effective methods for assuring integrity of images. A semi-fragile block-based image authentication technique is proposed which can not only localize the alteration detections but also recover the missing contents. The proposed technique distinguishes content-preserving manipulations from the content alterations using secure image hashing instead of cryptographic hashing. The original image is divided into large blocks (sub-images) which are also divided into 8×8 blocks. Secure image hashing is utilized to generate the sub-image hash (signature) which may slightly change when the content-preserving manipulations are applied. Furthermore, the sub-image code is generated using the JPEG compression scheme. Then, two sub-image hash copies and the sub-image code are embedded into relatively-distant sub-images using a doubly linked chain which prevents the vector quantization attack. The hash and code bits are robustly embedded in chosen discrete cosine transform (DCT) coefficients exploiting a property of DCT coefficients which is invariant before and after JPEG compression. The experimental results show that the proposed technique can successfully both localize and compensate the content alterations. Furthermore, it can effectively thwart many attacks such as vector quantization attacks.
Práva: © Václav Skala - UNION Agency
Vyskytuje se v kolekcích:WSCG 2010: Communication Papers Proceedings

Soubory připojené k záznamu:
Soubor Popis VelikostFormát 
Hassan.pdfPlný text405,9 kBAdobe PDFZobrazit/otevřít


Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam: http://hdl.handle.net/11025/11067

Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.